CVE-2025-23513
Published: 16 January 2025
Summary
CVE-2025-23513 is a high-severity CSRF (CWE-352) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely identification, reporting, and patching of flaws in the vulnerable Bible Embed WordPress plugin directly prevents exploitation of this specific CSRF-to-stored XSS vulnerability.
Mechanisms to protect session authenticity, such as CSRF tokens, directly block unauthenticated attackers from forging requests that store malicious XSS payloads.
Validating and sanitizing information inputs prevents the storage of malicious scripts submitted via CSRF attacks in the Bible Embed plugin.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CSRF-to-stored-XSS vulnerability in a public-facing WordPress plugin directly enables remote exploitation of the application (T1190) and facilitates drive-by compromise as the stored malicious scripts execute in browsers of users viewing affected content (T1189).
NVD Description
Cross-Site Request Forgery (CSRF) vulnerability in jd7777 Bible Embed bible-embed allows Stored XSS.This issue affects Bible Embed: from n/a through <= 0.0.4.
Deeper analysisAI
CVE-2025-23513 is a Cross-Site Request Forgery (CSRF) vulnerability in the Bible Embed WordPress plugin by jd7777, affecting all versions from n/a through 0.0.4. The flaw allows for Stored Cross-Site Scripting (XSS) and is classified under CWE-352, with a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity by tricking users into performing unintended actions, such as submitting a malicious request via a crafted webpage or link that requires user interaction. Successful exploitation enables the storage of malicious scripts on the target site, which then execute in the browsers of users viewing affected content, achieving low impacts on confidentiality, integrity, and availability within a changed scope.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/bible-embed/vulnerability/wordpress-bible-embed-plugin-0-0-4-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve provides details on this CSRF-to-stored XSS issue in Bible Embed version 0.0.4. Security practitioners should review this reference for recommended mitigations and patch availability.
Details
- CWE(s)