CVE-2025-22547
Published: 07 January 2025
Summary
CVE-2025-22547 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly addresses the stored XSS vulnerability by requiring timely patching or removal of the vulnerable JK Html To Pdf WordPress plugin as recommended in advisories.
Information input validation prevents the improper neutralization of input that enables attackers to inject malicious scripts via CSRF in the plugin.
Information output filtering neutralizes stored malicious scripts during web page generation, blocking XSS execution in users' browsers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS via unauthenticated CSRF in a public-facing WordPress plugin directly enables remote exploitation of the web application (T1190).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jaykrishnang JK Html To Pdf jk-html-to-pdf allows Stored XSS.This issue affects JK Html To Pdf: from n/a through <= 1.0.0.
Deeper analysisAI
CVE-2025-22547 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Stored Cross-site Scripting (XSS) under CWE-79, affecting the JK Html To Pdf WordPress plugin (jk-html-to-pdf) developed by jaykrishnang. The issue impacts all versions from n/a through 1.0.0, as published on 2025-01-07.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, user interaction needed, and changed scope with low impacts to confidentiality, integrity, and availability. Attackers without authentication can exploit it, potentially via CSRF leading to stored XSS as noted in advisories, injecting malicious scripts that persist and execute in the browsers of users interacting with affected pages or generated PDFs.
The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/jk-html-to-pdf/vulnerability/wordpress-jk-html-to-pdf-plugin-1-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve) describes the CSRF-to-stored XSS vulnerability in the JK Html To Pdf plugin version 1.0.0, recommending mitigation through plugin updates or removal where patches are unavailable.
Details
- CWE(s)