Cyber Posture

CVE-2025-30552

High

Published: 24 March 2025

Published
24 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0022 44.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-30552 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the WordPress plugin WordPress Admin Bar Improved (wordpress-admin-bar-improved) developed by Donald Gilbert. The flaw enables Stored Cross-Site Scripting (XSS) and affects all versions from n/a through 3.3.5. It received a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating a high-severity issue with network accessibility, low attack complexity, no required privileges, user interaction, changed scope, and low impacts across confidentiality, integrity, and availability.

An unauthenticated attacker can exploit this vulnerability remotely by tricking a victim—typically a logged-in WordPress user such as an administrator—into interacting with a malicious webpage or resource. This user interaction triggers a forged CSRF request to the vulnerable plugin, allowing the storage of malicious XSS payloads within the admin bar. Successful exploitation leads to Stored XSS execution in the context of subsequent users viewing the affected area, enabling potential theft of session data or other impacts aligned with the low CVSS impact metrics.

The Patchstack advisory provides detailed vulnerability information, including analysis of the CSRF-to-Stored XSS issue in version 3.3.5, at https://patchstack.com/database/Wordpress/Plugin/wordpress-admin-bar-improved/vulnerability/wordpress-wordpress-admin-bar-improved-plugin-3-3-5-csrf-to-stored-xss-vulnerability?_s_id=cve. Security practitioners should consult this reference for exploitation details and recommended mitigations, such as updating to a patched version if available or implementing CSRF protections.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

The CSRF-to-Stored XSS vulnerability in a public-facing WordPress plugin directly enables exploitation of the web application (T1190) and allows injection/execution of malicious JavaScript payloads in the browser context of authenticated users (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References