Cyber Posture

CVE-2025-30584

High

Published: 24 March 2025

Published
24 March 2025
Modified
28 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0022 44.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-30584 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the AlphaOmega Captcha & Anti-Spam Filter WordPress plugin developed by alphaomegaplugins. The flaw enables Stored Cross-Site Scripting (XSS) and affects all versions of the plugin from unspecified initial releases through 3.3 inclusive. Published on 2025-03-24, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).

Attackers can exploit this vulnerability remotely without requiring authentication privileges. By tricking an authenticated user, such as a site administrator, into visiting a malicious webpage or clicking a crafted link, the attacker can force a state-changing request to the vulnerable plugin endpoint. This results in the storage of a malicious XSS payload on the target site, which executes in the context of other users' browsers due to the changed scope, enabling potential theft of session data or further site compromise with low impacts across confidentiality, integrity, and availability.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/alphaomega-captcha-anti-spam/vulnerability/wordpress-alphaomega-captcha-anti-spam-filter-plugin-3-3-csrf-to-stored-xss-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

CSRF to stored XSS in public-facing WordPress plugin directly enables T1190 (exploit public-facing app), T1059.007 (JavaScript execution via XSS payload), and T1185 (browser session hijacking for session theft).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References