CVE-2025-23464
Published: 03 March 2025
Summary
CVE-2025-23464 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates reflected XSS by requiring filtering of information prior to output to web pages, addressing the improper neutralization of input during web page generation.
Enforces validation of information inputs to block malicious payloads that could be reflected back unneutralized in the WordPress plugin.
Requires timely identification, reporting, and correction of the specific flaw in the Twitter News Feed plugin versions up to 1.1.1.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in public-facing WordPress plugin enables exploitation via spearphishing links (T1566.002), arbitrary JavaScript execution (T1059.007), and browser session hijacking (T1185) as part of exploiting a public-facing application (T1190).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Keir Whitaker Twitter News Feed twitter-news-feed allows Reflected XSS.This issue affects Twitter News Feed: from n/a through <= 1.1.1.
Deeper analysisAI
CVE-2025-23464 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Twitter News Feed WordPress plugin (twitter-news-feed) developed by Keir Whitaker. This issue affects all versions of the plugin from its initial release through 1.1.1. Published on 2025-03-03, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), reflecting network accessibility, low attack complexity, no required privileges, user interaction dependency, changed scope, and low impacts across confidentiality, integrity, and availability.
An unauthenticated remote attacker can exploit this vulnerability by crafting malicious input that is reflected back in the web page without proper neutralization, tricking a user into accessing a malicious URL via social engineering, such as a phishing link. Successful exploitation executes arbitrary JavaScript in the victim's browser context, potentially enabling session hijacking, data theft, or further site compromise within the scope changed by the cross-origin effects.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/twitter-news-feed/vulnerability/wordpress-twitter-news-feed-plugin-1-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve documents the Reflected XSS in Twitter News Feed plugin version 1.1.1, providing details for WordPress administrators to assess and address the risk.
Details
- CWE(s)