Cyber Posture

CVE-2025-23646

High

Published: 14 February 2025

Published
14 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0011 29.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23646 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates identification, reporting, and correction of system flaws like this reflected XSS vulnerability in the WordPress plugin.

prevent

Requires filtering of information outputs to neutralize malicious scripts reflected in web page generation during XSS attacks.

prevent

Enforces validation of inputs to prevent improper neutralization exploited in reflected XSS by tricking users with malicious payloads.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
Why these techniques?

Reflected XSS in public-facing WordPress plugin enables exploitation of the web application via crafted links sent to users.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matt Brooks Library Instruction Recorder library-instruction-recorder allows Reflected XSS.This issue affects Library Instruction Recorder: from n/a through <= 1.1.4.

Deeper analysisAI

CVE-2025-23646 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Matt Brooks Library Instruction Recorder (library-instruction-recorder) WordPress plugin. This issue affects all versions from n/a through 1.1.4. Published on 2025-02-14, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility, low attack complexity, no required privileges, user interaction, and changed scope.

Remote attackers without privileges can exploit this vulnerability over the network by tricking authenticated users into interacting with maliciously crafted inputs, such as links or forms that reflect unsanitized data back in the web page response. Successful exploitation executes arbitrary JavaScript in the victim's browser within the context of the affected site, potentially leading to limited impacts on confidentiality (e.g., session token theft), integrity (e.g., data modification), and availability.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/library-instruction-recorder/vulnerability/wordpress-library-instruction-recorder-plugin-1-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve documents this Reflected XSS in Library Instruction Recorder version 1.1.4, providing details for WordPress site administrators to assess and address exposure.

Details

CWE(s)

CVEs Like This One

CVE-2025-24710Shared CWE-79
CVE-2025-24700Shared CWE-79
CVE-2025-68845Shared CWE-79
CVE-2026-22467Shared CWE-79
CVE-2025-23591Shared CWE-79
CVE-2025-23678Shared CWE-79
CVE-2025-23584Shared CWE-79
CVE-2026-27243Shared CWE-79
CVE-2026-28101Shared CWE-79
CVE-2025-26917Shared CWE-79

References