Cyber Posture

CVE-2025-30612

High

Published: 24 March 2025

Published
24 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0006 19.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-30612 is a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin Replace Default Words (also referred to as replace-default-words) by mandegarweb, which enables Stored XSS. The issue affects all versions of the plugin from its initial release through version 1.3 inclusive. It is classified under CWE-352 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, user interaction, changed scope, and low impacts across confidentiality, integrity, and availability.

An unauthenticated attacker can exploit this vulnerability by crafting a malicious webpage that, when visited by a targeted user (such as a site administrator), triggers a CSRF request to the plugin. This results in the storage of malicious XSS payloads, which can then execute in the browsers of subsequent users viewing affected pages, potentially leading to session hijacking, data theft, or further site compromise.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/replace-default-words/vulnerability/wordpress-replace-default-words-plugin-1-3-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve. Security practitioners should advise updating the plugin beyond version 1.3 where possible and implementing CSRF protections such as tokens in administrative forms.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

The CVE describes exploitation of a public-facing WordPress plugin vulnerability (T1190) via CSRF to achieve stored XSS, directly enabling client-side JavaScript execution in user browsers (T1059.007) for impacts like session hijacking.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References