CVE-2025-23646
Published: 14 February 2025
Summary
CVE-2025-23646 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates identification, reporting, and correction of system flaws like this reflected XSS vulnerability in the WordPress plugin.
Requires filtering of information outputs to neutralize malicious scripts reflected in web page generation during XSS attacks.
Enforces validation of inputs to prevent improper neutralization exploited in reflected XSS by tricking users with malicious payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in public-facing WordPress plugin enables exploitation of the web application via crafted links sent to users.
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matt Brooks Library Instruction Recorder library-instruction-recorder allows Reflected XSS.This issue affects Library Instruction Recorder: from n/a through <= 1.1.4.
Deeper analysisAI
CVE-2025-23646 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Matt Brooks Library Instruction Recorder (library-instruction-recorder) WordPress plugin. This issue affects all versions from n/a through 1.1.4. Published on 2025-02-14, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility, low attack complexity, no required privileges, user interaction, and changed scope.
Remote attackers without privileges can exploit this vulnerability over the network by tricking authenticated users into interacting with maliciously crafted inputs, such as links or forms that reflect unsanitized data back in the web page response. Successful exploitation executes arbitrary JavaScript in the victim's browser within the context of the affected site, potentially leading to limited impacts on confidentiality (e.g., session token theft), integrity (e.g., data modification), and availability.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/library-instruction-recorder/vulnerability/wordpress-library-instruction-recorder-plugin-1-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve documents this Reflected XSS in Library Instruction Recorder version 1.1.4, providing details for WordPress site administrators to assess and address exposure.
Details
- CWE(s)