Cyber Posture

CVE-2025-27321

High

Published: 24 February 2025

Published
24 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0015 35.3th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-27321 is a Cross-Site Request Forgery (CSRF) vulnerability in the Blighty Explorer WordPress plugin (blighty-explorer) that enables Stored Cross-Site Scripting (XSS). This issue affects all versions from n/a through 2.3.0 and is classified under CWE-352.

The vulnerability can be exploited remotely by unauthenticated attackers (PR:N) with low attack complexity (AC:L), though it requires user interaction (UI:R). Exploitation occurs over the network (AV:N) and changes scope (S:C), potentially resulting in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), as reflected in its CVSS v3.1 base score of 7.1. Attackers can leverage the CSRF to inject and store malicious scripts via XSS.

The Patchstack advisory provides details on this WordPress plugin vulnerability at https://patchstack.com/database/Wordpress/Plugin/blighty-explorer/vulnerability/wordpress-blightly-explorer-plugin-2-3-0-csrf-to-stored-xss-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

CSRF to stored XSS in public-facing WordPress plugin directly enables T1190 (Exploit Public-Facing Application) and T1059.007 (JavaScript execution via malicious script injection).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References