CVE-2025-23524
Published: 03 March 2025
Summary
CVE-2025-23524 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Web Portal Capture (T1056.003); ranked at the 45.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the specific reflected XSS flaw in the ClickBank Storefront plugin by identifying, patching, or removing vulnerable versions up to 1.7.
Prevents reflected XSS by filtering user inputs prior to inclusion in dynamically generated web pages, addressing improper neutralization during web page generation.
Mitigates exploitation by validating and sanitizing untrusted network inputs that could be reflected as malicious scripts in the victim's browser.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS enables arbitrary browser script execution via malicious link, directly facilitating web portal input capture (T1056.003), browser session hijacking (T1185), web session cookie theft (T1539), and exploitation via spearphishing link (T1566.002).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dactum ClickBank Storefront mycbgenie-clickbank-storefront allows Reflected XSS.This issue affects ClickBank Storefront: from n/a through <= 1.7.
Deeper analysisAI
CVE-2025-23524 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (CWE-79), in the dactum ClickBank Storefront WordPress plugin (mycbgenie-clickbank-storefront). This issue affects all versions of the plugin from unknown initial release through 1.7 inclusive.
The vulnerability can be exploited by remote attackers with network access, requiring low attack complexity, no privileges, and user interaction such as clicking a malicious link. Exploitation changes the security scope and enables arbitrary script execution in the victim's browser context, resulting in low impacts to confidentiality, integrity, and availability, with an overall CVSS v3.1 score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Patchstack's advisory (https://patchstack.com/database/Wordpress/Plugin/mycbgenie-clickbank-storefront/vulnerability/wordpress-clickbank-storefront-wordpress-plugin-plugin-1-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) documents the Reflected XSS vulnerability in the WordPress ClickBank Storefront plugin up to version 1.7.
Details
- CWE(s)