Cyber Posture

CVE-2025-23626

High

Published: 23 January 2025

Published
23 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0018 38.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23626 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-15 directly prevents reflected XSS by requiring filtering and encoding of information outputs during web page generation in the Kumihimo plugin.

prevent

SI-10 enforces validation of user inputs to neutralize malicious payloads before they are processed and reflected by the vulnerable Kumihimo plugin.

prevent

SI-2 requires timely identification and remediation of flaws like the improper input neutralization in Kumihimo versions up to 1.0.2 through patching.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Reflected XSS in public-facing WordPress plugin enables exploitation via malicious URL (T1190, T1204.001) leading to browser session hijacking and web session cookie theft (T1185, T1539).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fukushima Kumihimo kumihimo allows Reflected XSS.This issue affects Kumihimo: from n/a through <= 1.0.2.

Deeper analysisAI

CVE-2025-23626 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS), affecting the Kumihimo WordPress plugin developed by fukushima. This issue impacts all versions of the plugin up to and including 1.0.2, as the vulnerable range is listed from n/a through <= 1.0.2. The vulnerability carries a CVSS v3.1 base score of 7.1, with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L, indicating network accessibility, low attack complexity, no required privileges, user interaction needed, changed scope, and low impacts on confidentiality, integrity, and availability.

A remote attacker without privileges can exploit this vulnerability by crafting a malicious URL that injects scripted content into a web page generated by the Kumihimo plugin. This requires a user, such as a site visitor or authenticated WordPress user, to interact by visiting the link, at which point the reflected payload executes in the victim's browser context. Successful exploitation could allow the attacker to steal session cookies, perform actions on behalf of the user, or access sensitive data within the site's scope, leveraging the changed scope (S:C) for potential cross-origin effects.

Mitigation details are provided in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/kumihimo/vulnerability/wordpress-kumihimo-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve, which documents the vulnerability in the WordPress Kumihimo plugin version 1.0.2. Security practitioners should update to a patched version if available or apply input sanitization workarounds pending vendor fixes.

Details

CWE(s)

CVEs Like This One

CVE-2025-23688Shared CWE-79
CVE-2026-25033Shared CWE-79
CVE-2025-0817Shared CWE-79
CVE-2025-12551Shared CWE-79
CVE-2026-24665Shared CWE-79
CVE-2025-23609Shared CWE-79
CVE-2026-32728Shared CWE-79
CVE-2026-2072Shared CWE-79
CVE-2024-55227Shared CWE-79
CVE-2025-25062Shared CWE-79

References