Cyber Posture

CVE-2025-30560

High

Published: 24 March 2025

Published
24 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0009 25.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-30560 is a Cross-Site Request Forgery (CSRF) vulnerability in the Sana Ullah jQuery Dropdown Menu plugin (jquery-drop-down-menu-plugin) for WordPress that enables Stored Cross-Site Scripting (XSS). The issue affects all versions of the plugin from its initial release through version 3.0 inclusive, as documented under CWE-352.

Attackers can exploit this vulnerability without privileges over the network by tricking an authenticated WordPress user into submitting a malicious request, such as through a crafted webpage or link that the user interacts with. Successful exploitation stores an XSS payload on the site, which executes in the context of other users viewing affected pages, potentially leading to session hijacking, data theft, or further site compromise. The CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) reflects high severity due to network accessibility, low attack complexity, required user interaction, and scope change with low impacts on confidentiality, integrity, and availability.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/jquery-drop-down-menu-plugin/vulnerability/wordpress-jquery-dropdown-menu-plugin-3-0-csrf-to-stored-xss-vulnerability?_s_id=cve provides details on this CSRF-to-Stored XSS vulnerability in the WordPress plugin version 3.0. Security practitioners should review this reference for mitigation guidance, including any available patches or workarounds.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Vulnerability in public-facing WordPress plugin directly enables network exploitation (T1190); stored XSS payload facilitates arbitrary JavaScript execution in victim browsers (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References