CVE-2025-31585
Published: 31 March 2025
Description
Adversaries may abuse various implementations of JavaScript for execution.
Security Summary
CVE-2025-31585 is a Cross-Site Request Forgery (CSRF) vulnerability, mapped to CWE-352, in the Leadfox for WordPress plugin. It affects all versions from n/a through 2.1.9. Published on 2025-03-31T13:15:51.710, the vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Attackers can exploit this over the network with low complexity and no required privileges, though user interaction is needed. Exploitation involves tricking an authenticated user, such as a site administrator, into performing unintended actions via a forged request, potentially leading to low-level impacts on confidentiality, integrity, and availability with a changed scope.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/leadfox/vulnerability/wordpress-leadfox-for-wordpress-plugin-2-1-8-csrf-to-stored-xss-vulnerability?_s_id=cve describes it as a CSRF-to-stored XSS issue specifically in version 2.1.8; security practitioners should review it for detailed mitigation guidance, such as updating the plugin.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
CSRF-to-stored XSS in public-facing WordPress plugin directly enables T1190 (exploit public-facing app) and T1059.007 (JavaScript execution via injected XSS payload).