Cyber Posture

CVE-2025-22593

High

Published: 07 January 2025

Published
07 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0018 38.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22593 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs to neutralize malicious payloads like XSS scripts injected via CSRF in the Laika Pedigree Tree plugin.

prevent

SI-15 mandates filtering of information outputs to prevent execution of stored XSS payloads when users view affected pedigree tree pages.

prevent

SI-2 ensures timely flaw remediation, such as patching the vulnerable Laika Pedigree Tree plugin versions <=1.4 or applying input sanitization.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS in public-facing WordPress plugin directly enables exploitation of public-facing apps (T1190) and facilitates browser session hijacking via injected scripts (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in burria Laika Pedigree Tree laika-pedigree-tree allows Stored XSS.This issue affects Laika Pedigree Tree: from n/a through <= 1.4.

Deeper analysisAI

CVE-2025-22593 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Stored Cross-Site Scripting (XSS) under CWE-79, affecting the Laika Pedigree Tree WordPress plugin (also referred to as burria Laika Pedigree Tree laika-pedigree-tree). The issue impacts all versions from n/a through 1.4 inclusive. It has a CVSS v3.1 base score of 7.1, reflecting network accessibility (AV:N), low attack complexity (AC:L), no privileges required (PR:N), required user interaction (UI:R), changed scope (S:C), and low impacts on confidentiality, integrity, and availability (C:I:A:L/L/L).

Unauthenticated attackers can exploit this vulnerability over the network by leveraging a CSRF vector to inject malicious payloads into stored content within the plugin, as indicated by the advisory title referencing a CSRF-to-Stored XSS issue in version 1.4. Exploitation requires tricking a user into performing an action, such as submitting a form, which stores the XSS payload. When authenticated users or administrators view the affected pedigree tree pages, the payload executes in their browser context, potentially enabling theft of session cookies, session hijacking, or further phishing attacks within the site's scope.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/laika-pedigree-tree/vulnerability/wordpress-laika-pedigree-tree-plugin-1-4-csrf-to-stored-xss-vulnerability?_s_id=cve documents the vulnerability and provides details on the CSRF-to-Stored XSS flaw, including recommendations for mitigation such as updating to a patched version if available or applying input sanitization workarounds.

Details

CWE(s)

CVEs Like This One

CVE-2025-22751Shared CWE-79
CVE-2026-30862Shared CWE-79
CVE-2025-23726Shared CWE-79
CVE-2025-67932Shared CWE-79
CVE-2025-28928Shared CWE-79
CVE-2025-23843Shared CWE-79
CVE-2025-68538Shared CWE-79
CVE-2025-27088Shared CWE-79
CVE-2025-23811Shared CWE-79
CVE-2025-23846Shared CWE-79

References