Cyber Posture

CVE-2025-22498

High

Published: 13 January 2025

Published
13 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0009 25.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22498 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 25.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Browser Session Hijacking (T1185) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires filtering of information outputs during web page generation to neutralize reflected XSS payloads before they execute in the victim's browser.

prevent

Mandates validation of user inputs to block malicious scripts from being accepted and reflected in LucidLMS web pages.

prevent

Directly addresses remediation of the specific reflected XSS flaw in the LucidLMS WordPress plugin through identification, patching, and verification.

MITRE ATT&CK Enterprise TechniquesAI

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
Why these techniques?

Reflected XSS directly enables browser script execution for session hijacking (T1185) and is delivered via malicious/phishing links (T1566.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N3wNormal LucidLMS lucidlms allows Reflected XSS.This issue affects LucidLMS: from n/a through <= 1.0.5.

Deeper analysisAI

CVE-2025-22498 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the N3wNormal LucidLMS (lucidlms) WordPress plugin. This issue affects all versions from n/a through 1.0.5. Published on 2025-01-13, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, user interaction needed, changed scope, and low impacts to confidentiality, integrity, and availability.

Remote attackers can exploit this Reflected XSS without authentication by crafting malicious inputs or links that a user must interact with, such as clicking a phishing link. Upon reflection during web page generation, this executes arbitrary scripts in the victim's browser context, potentially enabling session hijacking, data theft, or other client-side attacks, with the changed scope allowing influence beyond the targeted user or resource.

The Patchstack advisory provides details on this WordPress plugin vulnerability, including recommendations for mitigation, available at https://patchstack.com/database/Wordpress/Plugin/lucidlms/vulnerability/wordpress-lucidlms-plugin-1-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve.

Details

CWE(s)

CVEs Like This One

CVE-2025-22682Shared CWE-79
CVE-2025-67978Shared CWE-79
CVE-2025-23904Shared CWE-79
CVE-2024-13919Shared CWE-79
CVE-2025-22754Shared CWE-79
CVE-2025-23547Shared CWE-79
CVE-2025-23593Shared CWE-79
CVE-2026-25352Shared CWE-79
CVE-2025-1487Shared CWE-79
CVE-2026-28110Shared CWE-79

References