CVE-2025-0953
Published: 22 February 2025
Summary
CVE-2025-0953 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Yaycommerce Yaysmtp. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 32.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses insufficient input sanitization by requiring validation of all inputs to prevent injection of arbitrary web scripts into WordPress plugin storage.
Mitigates stored XSS by enforcing output filtering and escaping before rendering injected scripts in user-accessed pages.
Ensures timely flaw remediation through patching the vulnerable YaySMTP plugin versions up to 1.2, as indicated by the applied changeset.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS in public-facing WordPress plugin directly enables remote exploitation of the web application (T1190) and facilitates browser session hijacking via injected scripts (T1185).
NVD Description
The SMTP for Sendinblue – YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary…
more
web scripts in pages that will execute whenever a user accesses an injected page.
Deeper analysisAI
CVE-2025-0953 is a Stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting the SMTP for Sendinblue – YaySMTP plugin for WordPress in versions up to and including 1.2. The flaw arises from insufficient input sanitization and output escaping, enabling the injection of arbitrary web scripts into pages. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N) and was published on 2025-02-22T13:15:11.850.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required. By injecting malicious scripts, they can have them execute in the context of any user's browser when accessing the affected page, potentially leading to session hijacking, data theft, or further site compromise given the changed scope (S:C).
Advisories and references, including Wordfence threat intelligence and WordPress plugin trac repositories, detail the vulnerable code in files like Functions.php and Utils.php, with changeset 3270561 indicating a patch application. Security practitioners should review these sources for updated plugin versions beyond 1.2 to mitigate the issue.
Details
- CWE(s)