Cyber Posture

CVE-2025-28900

High

Published: 11 March 2025

Published
11 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0008 23.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-28900 is a Cross-Site Request Forgery (CSRF) vulnerability in the TabGarb Pro WordPress plugin developed by webgarb that enables Stored XSS. The flaw affects TabGarb Pro versions from n/a through 2.6 inclusive and is associated with CWE-352. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, user interaction, changed scope, and low impacts across confidentiality, integrity, and availability.

Attackers can exploit this vulnerability remotely without authentication by tricking logged-in users into interacting with a malicious webpage or link that submits a forged request. This leads to the storage of XSS payloads within the plugin, which can then execute in the context of other users viewing affected content, potentially enabling session hijacking, data theft, or further site compromise depending on the payload.

The Patchstack advisory provides details on this WordPress TabGarb Pro plugin vulnerability, including vulnerability specifics and likely mitigation guidance such as updating to a patched version beyond 2.6; practitioners should consult https://patchstack.com/database/Wordpress/Plugin/tabgarb/vulnerability/wordpress-tabgarb-pro-plugin-2-6-csrf-to-stored-xss-vulnerability?_s_id=cve for full remediation steps.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

The CSRF-to-stored-XSS vulnerability in a public-facing WordPress plugin is directly exploitable via T1190 (Exploit Public-Facing Application). The stored XSS payload enables T1185 (Browser Session Hijacking) through cookie theft and session impersonation in victim browsers.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References