Cyber Posture

CVE-2025-0521

High

Published: 18 February 2025

Published
18 February 2025
Modified
21 February 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0041 61.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0521 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Wpexperts Post Smtp. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 38.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly counters insufficient input sanitization of 'from' and 'subject' parameters by enforcing validation to reject XSS payloads before storage.

prevent

Addresses lack of output escaping by filtering rendered content to neutralize injected scripts before execution in user browsers.

prevent

Mandates timely flaw remediation, such as updating the Post SMTP plugin beyond version 3.0.2 to patch the sanitization issues.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS in public-facing WordPress plugin directly matches T1190 exploitation; enables arbitrary JavaScript execution (T1059.007) and browser session hijacking (T1185) via injected scripts.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the from and subject parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated…

more

attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Deeper analysisAI

CVE-2025-0521 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, in the Post SMTP plugin for WordPress. It affects all versions up to and including 3.0.2 due to insufficient input sanitization and output escaping of the "from" and "subject" parameters. This flaw enables the injection of arbitrary web scripts into pages, which was publicly disclosed on 2025-02-18 with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).

Unauthenticated attackers can exploit the vulnerability remotely with low attack complexity and no privileges or user interaction required. By submitting malicious payloads via the affected parameters, they can store scripts on the site that execute in the context of any user's browser when accessing the injected page, potentially leading to session hijacking, data theft, or further site compromise given the changed scope in the CVSS vector.

Mitigation details are available in advisories from Wordfence and the WordPress plugin trac repository. The plugin's trunk saw a relevant changeset from revision 3229076 to 3237626, indicating a patch that addresses the sanitization issues in versions beyond 3.0.2. Security practitioners should urge WordPress site owners to update the Post SMTP plugin immediately.

Details

CWE(s)

Affected Products

wpexperts
post smtp
≤ 3.1.0

CVEs Like This One

CVE-2025-22800Same product: Wpexperts Post Smtp
CVE-2025-27405Shared CWE-79
CVE-2026-25156Shared CWE-79
CVE-2025-69096Shared CWE-79
CVE-2025-15440Shared CWE-79
CVE-2026-22524Shared CWE-79
CVE-2026-4803Shared CWE-79
CVE-2025-40587Shared CWE-79
CVE-2026-26930Shared CWE-79
CVE-2025-23998Shared CWE-79

References