CVE-2025-28933
Published: 11 March 2025
Description
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Security Summary
CVE-2025-28933 is a Cross-Site Request Forgery (CSRF) vulnerability in the maxfoundry MaxA/B (maxab) WordPress plugin that enables Stored XSS. The issue affects MaxA/B versions from n/a through 2.2.2, as documented under CWE-352. It carries a CVSS v3.1 base score of 7.1, reflecting network accessibility with low attack complexity.
The vulnerability can be exploited by unauthenticated attackers over the network who trick authenticated users into interacting with a malicious request, such as clicking a crafted link or loading a malicious page. Successful exploitation changes the scope and allows limited impacts on confidentiality, integrity, and availability, primarily through the storage of XSS payloads that execute in the context of the victim's browser.
Patchstack's advisory at https://patchstack.com/database/Wordpress/Plugin/maxab/vulnerability/wordpress-maxa-b-plugin-2-2-2-csrf-to-stored-xss-vulnerability?_s_id=cve details the CSRF-to-Stored XSS issue in WordPress MaxA/B plugin version 2.2.2. The vulnerability was published on 2025-03-11T21:15:51.290.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
CSRF-to-Stored XSS in public-facing WordPress plugin directly maps to exploiting public-facing applications (T1190) and enables browser session hijacking via injected XSS payloads (T1185).