CVE-2025-28882
Published: 26 March 2025
Description
Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content.
Security Summary
CVE-2025-28882 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Omnify Widget plugin developed by Omnify, Inc. for WordPress. The issue affects all versions of the plugin from n/a through 2.0.3, where user input is not properly sanitized during web page generation, enabling malicious script injection.
With a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), the vulnerability is exploitable remotely over the network by unauthenticated attackers with low attack complexity. Exploitation requires user interaction, such as clicking a malicious link, after which the changed scope allows limited impacts on confidentiality, integrity, and availability. Attackers can typically execute scripts in the victim's browser context to steal session cookies, perform unauthorized actions, or deface content.
The Patchstack advisory details this reflected XSS vulnerability in the WordPress Omnify plugin up to version 2.0.3 and serves as the primary reference for practitioners. Mitigation involves updating to a version beyond 2.0.3 if available, alongside standard XSS defenses like input validation, output encoding, and Content Security Policy implementation.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Reflected XSS in public-facing WordPress plugin directly enables T1190 (public-facing app exploitation) and T1203 (client execution via malicious script injection); requires T1204.001 (malicious link); facilitates T1185 (browser session hijacking), T1539 (steal web session cookie), and T1491 (defacement).