Cyber Posture

CVE-2025-23598

High

Published: 14 February 2025

Published
14 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0010 27.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23598 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents reflected XSS by filtering and encoding user input reflected in web page output to block JavaScript execution.

prevent

Enforces validation of untrusted inputs to neutralize malicious scripts before they are processed and reflected in Recip.ly plugin responses.

prevent

Requires timely flaw remediation to patch the specific reflected XSS vulnerability in Recip.ly WordPress plugin versions through 1.1.8.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
Why these techniques?

Reflected XSS in public-facing WordPress plugin enables exploitation of web application (T1190) for arbitrary JavaScript execution in browser (T1059.007), typically via crafted malicious URLs in spearphishing (T1566.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in craig.edmunds@gmail.com Recip.ly reciply allows Reflected XSS.This issue affects Recip.ly: from n/a through <= 1.1.8.

Deeper analysisAI

CVE-2025-23598 is an Improper Neutralization of Input During Web Page Generation vulnerability, enabling Reflected Cross-site Scripting (XSS) as classified under CWE-79. It affects the Recip.ly WordPress plugin (also referenced as recip-ly), developed by craig.edmunds@gmail.com, across all versions from n/a through 1.1.8 inclusive.

The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility with low attack complexity, no required privileges, but necessitating user interaction. Remote attackers can exploit it by tricking authenticated or unauthenticated users—such as site visitors or administrators—into interacting with malicious input, like a crafted URL or form submission. Successful exploitation allows injection and execution of arbitrary JavaScript in the victim's browser context, with low impacts on confidentiality, integrity, and availability due to the changed scope.

Patchstack's advisory at https://patchstack.com/database/Wordpress/Plugin/reciply/vulnerability/wordpress-recip-ly-plugin-1-1-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve documents the reflected XSS issue specifically in Recip.ly plugin version 1.1.8 for WordPress, providing details for security practitioners to assess and address exposure in affected environments.

Details

CWE(s)

CVEs Like This One

CVE-2026-27348Shared CWE-79
CVE-2026-31845Shared CWE-79
CVE-2025-27002Shared CWE-79
CVE-2025-68906Shared CWE-79
CVE-2025-22317Shared CWE-79
CVE-2026-28126Shared CWE-79
CVE-2025-68836Shared CWE-79
CVE-2025-68892Shared CWE-79
CVE-2025-23732Shared CWE-79
CVE-2025-22294Shared CWE-79

References