Cyber Posture

CVE-2025-22356

High

Published: 28 March 2025

Published
28 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0016 36.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22356 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 36.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to JavaScript (T1059.007) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely identification, reporting, and patching of the reflected XSS flaw in Stencies plugin versions through 0.58.

prevent

Enforces output filtering and encoding during web page generation to neutralize injected scripts from malicious URLs in the reflected XSS attack.

prevent

Validates inputs at web entry points like URLs to reject or sanitize malicious payloads before they are reflected in page generation.

MITRE ATT&CK Enterprise TechniquesAI

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
Why these techniques?

Reflected XSS enables arbitrary JavaScript execution in the victim's browser (T1059.007), directly facilitating browser session hijacking and data theft (T1185); exploitation typically involves delivering a crafted malicious URL via spearphishing (T1566.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stencies Stencies stencies allows Reflected XSS.This issue affects Stencies: from n/a through <= 0.58.

Deeper analysisAI

CVE-2025-22356 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, affecting the Stencies WordPress plugin. This issue impacts all versions of Stencies from n/a through 0.58 inclusive. The vulnerability was published on 2025-03-28 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).

Attackers can exploit this vulnerability remotely over the network with low attack complexity and no required privileges, though it necessitates user interaction, such as visiting a maliciously crafted URL. Upon successful exploitation, adversaries can inject and execute arbitrary scripts in the victim's browser context due to the changed scope, resulting in low impacts to confidentiality, integrity, and availability, such as potential session hijacking or data theft within the site's domain.

The primary advisory from Patchstack, available at https://patchstack.com/database/Wordpress/Plugin/stencies/vulnerability/wordpress-stencies-plugin-0-58-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve, documents the Reflected XSS flaw specifically in Stencies plugin version 0.58 and provides details relevant to mitigation for affected WordPress installations.

Details

CWE(s)

CVEs Like This One

CVE-2026-25352Shared CWE-79
CVE-2025-24535Shared CWE-79
CVE-2026-33136Shared CWE-79
CVE-2026-30918Shared CWE-79
CVE-2026-25461Shared CWE-79
CVE-2024-13574Shared CWE-79
CVE-2025-23464Shared CWE-79
CVE-2025-23491Shared CWE-79
CVE-2025-22682Shared CWE-79
CVE-2026-24838Shared CWE-79

References