Cyber Posture

CVE-2025-28901

High

Published: 11 March 2025

Published
11 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0008 23.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-28901 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the WordPress plugin "Members page only for logged in users" (slug: members-page-only-for-logged-in-users). This flaw allows Stored XSS and affects all versions of the plugin up to and including 1.4.2. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating a high-severity issue exploitable over the network with low complexity, no required privileges, and user interaction.

An unauthenticated attacker (PR:N) can exploit this CSRF vulnerability by tricking a logged-in user—likely an administrator or authorized user with access to the Members page—into visiting a malicious webpage. This action would forge a request to the vulnerable plugin, enabling the storage of a malicious XSS payload on the Members page. Successful exploitation leads to Stored XSS, potentially allowing the attacker to steal sensitive data (C:L), perform actions on behalf of the victim (I:L), or cause limited denial of service (A:L), with the changed scope (S:C) amplifying impact across contexts.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/members-page-only-for-logged-in-users/vulnerability/wordpress-members-page-only-for-logged-in-users-plugin-1-4-2-csrf-to-stored-xss-vulnerability?_s_id=cve provides details on the vulnerability, including recommended mitigations such as updating to a patched version of the plugin beyond 1.4.2. Security practitioners should verify the latest plugin release and apply updates promptly, while also implementing general CSRF protections like token validation where possible.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

The CSRF vulnerability in the public-facing WordPress plugin directly enables exploitation of the web application (T1190), and the resulting stored XSS payload facilitates arbitrary JavaScript execution in the browser context of affected users (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References