CVE-2025-23575
Published: 03 March 2025
Summary
CVE-2025-23575 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 45.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-15 directly addresses the improper neutralization of input during web page generation by requiring output filtering to prevent reflected XSS script injection.
SI-10 mitigates reflected XSS by validating user inputs to block malicious scripts before they are processed and reflected in web pages.
SI-2 requires timely flaw remediation, such as patching the DX Sales CRM plugin versions through 1.1, to eliminate the specific XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS allows injection and execution of arbitrary JavaScript in the victim's browser (T1059.007) when triggered by visiting a crafted URL, which is commonly delivered via spearphishing links (T1566.002).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DevriX DX Sales CRM dx-sales-crm allows Reflected XSS.This issue affects DX Sales CRM: from n/a through <= 1.1.
Deeper analysisAI
CVE-2025-23575 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the DevriX DX Sales CRM WordPress plugin (dx-sales-crm). The issue affects all versions from n/a through 1.1 inclusive and was published on 2025-03-03.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, and user interaction such as clicking a malicious link. Remote attackers can exploit it by injecting malicious scripts into web pages reflected back to users, achieving low impacts on confidentiality, integrity, and availability within a changed scope.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/dx-sales-crm/vulnerability/wordpress-dx-sales-crm-plugin-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve.
Details
- CWE(s)