Cyber Posture

CVE-2025-0953

High

Published: 22 February 2025

Published
22 February 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0054 67.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0953 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Yaycommerce Yaysmtp. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 32.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses insufficient input sanitization by requiring validation of all inputs to prevent injection of arbitrary web scripts into WordPress plugin storage.

prevent

Mitigates stored XSS by enforcing output filtering and escaping before rendering injected scripts in user-accessed pages.

prevent

Ensures timely flaw remediation through patching the vulnerable YaySMTP plugin versions up to 1.2, as indicated by the applied changeset.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS in public-facing WordPress plugin directly enables remote exploitation of the web application (T1190) and facilitates browser session hijacking via injected scripts (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The SMTP for Sendinblue – YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary…

more

web scripts in pages that will execute whenever a user accesses an injected page.

Deeper analysisAI

CVE-2025-0953 is a Stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting the SMTP for Sendinblue – YaySMTP plugin for WordPress in versions up to and including 1.2. The flaw arises from insufficient input sanitization and output escaping, enabling the injection of arbitrary web scripts into pages. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N) and was published on 2025-02-22T13:15:11.850.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required. By injecting malicious scripts, they can have them execute in the context of any user's browser when accessing the affected page, potentially leading to session hijacking, data theft, or further site compromise given the changed scope (S:C).

Advisories and references, including Wordfence threat intelligence and WordPress plugin trac repositories, detail the vulnerable code in files like Functions.php and Utils.php, with changeset 3270561 indicating a patch application. Security practitioners should review these sources for updated plugin versions beyond 1.2 to mitigate the issue.

Details

CWE(s)

Affected Products

yaycommerce
yaysmtp
≤ 1.2

CVEs Like This One

CVE-2025-0916Same product: Yaycommerce Yaysmtp
CVE-2025-0918Same product: Yaycommerce Yaysmtp
CVE-2025-22751Shared CWE-79
CVE-2026-30862Shared CWE-79
CVE-2025-23726Shared CWE-79
CVE-2025-67932Shared CWE-79
CVE-2025-28928Shared CWE-79
CVE-2025-23843Shared CWE-79
CVE-2025-68538Shared CWE-79
CVE-2025-27088Shared CWE-79

References