CVE-2025-23792
Published: 27 January 2025
Summary
CVE-2025-23792 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 42.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Information output filtering directly prevents reflected XSS by encoding or sanitizing user input before inclusion in web pages, addressing the improper neutralization vulnerability.
Information input validation rejects or sanitizes malicious payloads in user inputs, mitigating the root cause of reflected XSS exploitation.
Flaw remediation requires patching the vulnerable WordPress plugin to versions beyond 1.1.6, eliminating the specific XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The reflected XSS vulnerability directly enables script execution in the victim's browser by tricking the user into interacting with a malicious link or request, matching Exploitation for Client Execution.
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Busters Passwordless WP – Login with your glance or fingerprint passwordless-wp allows Reflected XSS.This issue affects Passwordless WP – Login with your glance or fingerprint: from n/a…
more
through <= 1.1.6.
Deeper analysisAI
CVE-2025-23792 is an Improper Neutralization of Input During Web Page Generation vulnerability, manifesting as Reflected Cross-site Scripting (XSS) and classified under CWE-79. It affects the WordPress plugin "Passwordless WP – Login with your glance or fingerprint" (passwordless-wp) in all versions from n/a through 1.1.6.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L). An unauthenticated attacker accessible over the network can exploit it with low attack complexity by tricking a user into performing an action, such as interacting with a malicious link or request. Exploitation enables script execution in the context of the victim's browser on the affected site, resulting in low impacts to confidentiality, integrity, and availability, accompanied by a scope change.
Patchstack documents this issue in their vulnerability database for the plugin at https://patchstack.com/database/Wordpress/Plugin/passwordless-wp/vulnerability/wordpress-passwordless-wp-login-with-your-glance-or-fingerprint-plugin-1-1-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve, which security practitioners should consult for mitigation guidance, such as updating to a non-vulnerable version beyond 1.1.6.
Details
- CWE(s)