CVE-2025-1436
Published: 13 March 2025
Summary
CVE-2025-1436 is a high-severity CSRF (CWE-352) vulnerability in Rivercitygraphix Limit Bio. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-23 enforces session authenticity mechanisms like CSRF tokens, directly preventing unauthorized setting updates via forged requests from malicious webpages.
SI-10 requires validation of information inputs, addressing the plugin's lack of sanitization and blocking injection of stored XSS payloads.
SI-15 mandates output filtering and escaping, preventing execution of any stored XSS payloads injected into plugin settings.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote CSRF vulnerability in a public-facing WordPress plugin that enables injection of stored XSS payloads, directly mapping to exploitation of public-facing applications (T1190) and JavaScript execution via the XSS (T1059.007).
NVD Description
The Limit Bio WordPress plugin through 1.0 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF…
more
attack.
Deeper analysisAI
CVE-2025-1436 is a cross-site request forgery (CSRF) vulnerability in the Limit Bio WordPress plugin through version 1.0, associated with CWE-352. The plugin lacks CSRF checks when updating its settings and fails to properly sanitize or escape inputs, enabling the injection of stored cross-site scripting (XSS) payloads. Published on March 13, 2025, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), reflecting network accessibility, low complexity, no privileges required, user interaction needed, and scope change with low impacts across confidentiality, integrity, and availability.
An attacker can exploit this remotely without authentication by crafting a malicious webpage that, when visited by a logged-in WordPress administrator, triggers a CSRF request to update the plugin settings. This injects a stored XSS payload, which persists and executes in the context of other users or admins viewing affected pages, potentially leading to session hijacking, data theft, or further site compromise.
The WPScan advisory at https://wpscan.com/vulnerability/849ed0a0-be17-43cf-a3a1-ad54dfb33d57/ provides details on the vulnerability, including recommended mitigations.
Details
- CWE(s)