CVE-2025-26987
Published: 25 February 2025
Description
Adversaries may abuse various implementations of JavaScript for execution.
Security Summary
CVE-2025-26987 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Shabti Kaplan Frontend Admin by DynamiApps acf-frontend-form-element WordPress plugin. This issue affects Frontend Admin by DynamiApps versions from n/a through 3.25.17. Published on 2025-02-25, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity by tricking users into performing an action, such as clicking a malicious link. Exploitation enables script execution in the victim's browser context, potentially leading to low impacts on confidentiality (e.g., limited data exposure), integrity (e.g., minor modifications), and availability (e.g., minor disruptions), with a changed scope affecting other users or resources.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/acf-frontend-form-element/vulnerability/wordpress-frontend-admin-by-dynamiapps-plugin-3-25-17-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve details the Reflected XSS in version 3.25.17 and provides guidance on mitigation for affected WordPress installations.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Reflected XSS is exploited by tricking users into clicking a malicious link, enabling arbitrary JavaScript execution in the victim's browser context.