Cyber Posture

CVE-2025-22682

High

Published: 03 February 2025

Published
03 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0004 12.3th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22682 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Spearphishing Link (T1566.002); ranked at the 12.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Spearphishing Link (T1566.002) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-15 mandates filtering of information outputs, directly preventing reflected XSS by ensuring user inputs are properly encoded before rendering in web pages affected by CVE-2025-22682.

prevent

SI-10 enforces validation of information inputs, blocking malicious payloads that exploit the improper neutralization vulnerability in the Hesabfa Accounting WordPress plugin.

prevent

SI-2 requires timely identification, reporting, and correction of system flaws, enabling patching of the specific reflected XSS vulnerability up to version 2.1.2 of the Hesabfa Accounting plugin.

MITRE ATT&CK Enterprise TechniquesAI

T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Reflected XSS enables exploitation via malicious links (Spearphishing Link) and arbitrary JS execution for session token theft (Browser Session Hijacking).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saeed Sattar Beglou Hesabfa Accounting hesabfa-accounting allows Reflected XSS.This issue affects Hesabfa Accounting: from n/a through <= 2.1.2.

Deeper analysisAI

CVE-2025-22682 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Hesabfa Accounting WordPress plugin developed by Saeed Sattar Beglou. This issue affects the plugin from unknown initial versions through 2.1.2. Published on 2025-02-03, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), reflecting high severity due to network accessibility, low attack complexity, no required privileges, user interaction, and changed scope.

Remote attackers can exploit this vulnerability by tricking authenticated or unauthenticated users into interacting with maliciously crafted links or inputs that trigger reflected XSS payloads on affected sites. Successful exploitation executes arbitrary JavaScript in the victim's browser context, potentially enabling session token theft, account takeover, or phishing within the site's domain. The changed scope (S:C) amplifies risks by allowing cross-origin effects, though impacts on confidentiality, integrity, and availability remain low.

The primary advisory from Patchstack (https://patchstack.com/database/Wordpress/Plugin/hesabfa-accounting/vulnerability/wordpress-hesabfa-accounting-plugin-2-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) documents the flaw in the Hesabfa Accounting plugin up to version 2.1.2. Practitioners should review this reference for vendor-recommended mitigations, such as applying available patches or hardening configurations against XSS.

Details

CWE(s)

CVEs Like This One

CVE-2025-67978Shared CWE-79
CVE-2025-23904Shared CWE-79
CVE-2024-13919Shared CWE-79
CVE-2025-22498Shared CWE-79
CVE-2025-22754Shared CWE-79
CVE-2025-23547Shared CWE-79
CVE-2025-23593Shared CWE-79
CVE-2026-25352Shared CWE-79
CVE-2025-1487Shared CWE-79
CVE-2026-28110Shared CWE-79

References