Cyber Posture

CVE-2025-28882

High

Published: 26 March 2025

Published
26 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0019 40.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content.

Security Summary

CVE-2025-28882 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Omnify Widget plugin developed by Omnify, Inc. for WordPress. The issue affects all versions of the plugin from n/a through 2.0.3, where user input is not properly sanitized during web page generation, enabling malicious script injection.

With a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), the vulnerability is exploitable remotely over the network by unauthenticated attackers with low attack complexity. Exploitation requires user interaction, such as clicking a malicious link, after which the changed scope allows limited impacts on confidentiality, integrity, and availability. Attackers can typically execute scripts in the victim's browser context to steal session cookies, perform unauthorized actions, or deface content.

The Patchstack advisory details this reflected XSS vulnerability in the WordPress Omnify plugin up to version 2.0.3 and serves as the primary reference for practitioners. Mitigation involves updating to a version beyond 2.0.3 if available, alongside standard XSS defenses like input validation, output encoding, and Content Security Policy implementation.

Details

CWE(s)
CWE-79

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1491 Defacement Impact
Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content.
Why these techniques?

Reflected XSS in public-facing WordPress plugin directly enables T1190 (public-facing app exploitation) and T1203 (client execution via malicious script injection); requires T1204.001 (malicious link); facilitates T1185 (browser session hijacking), T1539 (steal web session cookie), and T1491 (defacement).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References