CVE-2025-22325
Published: 07 January 2025
Summary
CVE-2025-22325 is a high-severity CSRF (CWE-352) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 33.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces session authenticity mechanisms like anti-CSRF tokens to block forged requests that inject stored XSS payloads into the Autocompleter plugin.
Validates and sanitizes inputs to the plugin to prevent malicious XSS payloads from being accepted and stored via the CSRF vector.
Filters and encodes plugin outputs to neutralize any stored XSS payloads before execution in users' browsers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CSRF-to-stored-XSS in public-facing WordPress plugin directly enables remote exploitation of a web application (T1190) and is triggered via a malicious webpage visited by the victim (T1189).
NVD Description
Cross-Site Request Forgery (CSRF) vulnerability in nchankov Autocompleter autocompleter allows Stored XSS.This issue affects Autocompleter: from n/a through <= 1.3.5.2.
Deeper analysisAI
CVE-2025-22325 is a Cross-Site Request Forgery (CSRF) vulnerability in the nchankov Autocompleter WordPress plugin that allows Stored Cross-Site Scripting (XSS). This issue affects Autocompleter versions from an unspecified initial release through 1.3.5.2 and is associated with CWE-352. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Attackers can exploit this vulnerability remotely over the network with low attack complexity and no required privileges, though it requires user interaction. By tricking an authenticated user into performing a CSRF-protected action via a malicious webpage, an attacker can inject a stored XSS payload into the plugin, which executes in the context of the WordPress site for subsequent users.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/autocompleter/vulnerability/wordpress-autocompleter-plugin-1-3-5-2-csrf-to-stored-xss-vulnerability?_s_id=cve documents this CSRF to Stored XSS vulnerability in the Autocompleter plugin version 1.3.5.2.
Details
- CWE(s)