CVE-2025-22326
Published: 07 January 2025
Summary
CVE-2025-22326 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 47.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-15 directly prevents reflected XSS by requiring filtering of information output to web pages, addressing the improper neutralization of input during web page generation in the 5centsCDN plugin.
SI-10 enforces validation of user inputs to ensure they are appropriate and safe, mitigating the root cause of reflected XSS where untrusted input is reflected without sanitization.
SI-2 requires timely identification, reporting, and remediation of flaws like this reflected XSS vulnerability in the 5centsCDN WordPress plugin up to version 25.4.15.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS directly enables arbitrary JavaScript execution in victim browsers (T1059.007).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 5centsCDN 5centsCDN 5centscdn allows Reflected XSS.This issue affects 5centsCDN: from n/a through <= 25.4.15.
Deeper analysisAI
CVE-2025-22326 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the 5centsCDN WordPress plugin. It affects all versions of 5centsCDN from n/a through 25.4.15.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating exploitation is possible over the network with low attack complexity, no required privileges, but user interaction such as visiting a malicious link. Attackers can leverage reflected XSS to inject and execute arbitrary scripts in a victim's browser context, achieving low impacts on confidentiality, integrity, and availability due to the changed scope.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/5centscdn/vulnerability/wordpress-5centscdn-wordpress-cdn-plugin-plugin-24-8-16-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve.
Details
- CWE(s)