CVE-2025-31459
Published: 28 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-31459 is a Cross-Site Request Forgery (CSRF) vulnerability in the PasqualePuzio Login Alert WordPress plugin (login-alert) that allows Stored XSS. This issue affects all versions from n/a through 0.2.1 and is associated with CWE-352. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
The vulnerability can be exploited by unauthenticated attackers over the network with low attack complexity, requiring user interaction such as clicking a malicious link. Exploitation involves tricking a victim (typically an authenticated user like an administrator) into submitting a forged request, enabling the storage of malicious XSS payloads on the site. This can lead to low-level impacts on confidentiality, integrity, and availability, with a changed scope to high due to the cross-origin nature of the attack.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/login-alert/vulnerability/wordpress-login-alert-plugin-0-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve provides further details on the vulnerability in the WordPress Login Alert plugin 0.2.1.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The CVE describes a CSRF vulnerability leading to stored XSS in a public-facing WordPress plugin, directly enabling network-based exploitation of a public-facing application without authentication.