Cyber Posture

CVE-2025-28855

High

Published: 26 March 2025

Published
26 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0019 40.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.

Security Summary

CVE-2025-28855 is an Improper Neutralization of Input During Web Page Generation vulnerability, enabling Reflected Cross-site Scripting (XSS) as classified under CWE-79. It affects the Teleport WordPress plugin developed by srcoley, with vulnerable versions spanning from n/a through 1.2.4.

The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, and user interaction such as clicking a malicious link. Remote attackers can exploit it to inject and execute arbitrary scripts in a user's browser context, potentially leading to limited impacts on confidentiality, integrity, and availability within a changed scope.

Patchstack's advisory documents this Reflected XSS issue specifically in Teleport plugin version 1.2.4, providing details on the vulnerability for WordPress environments.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
Why these techniques?

Reflected XSS in a public-facing WordPress plugin allows an attacker to craft a malicious link that, when visited by a user, injects and executes arbitrary scripts in the browser context. This directly matches Drive-by Compromise (T1189), where victims are tricked into visiting a site that delivers malicious client-side code.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References