Cyber Posture

CVE-2025-23801

High

Published: 16 January 2025

Published
16 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0008 22.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23801 is a high-severity CSRF (CWE-352) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces session authenticity mechanisms like CSRF tokens to prevent forged requests that store XSS payloads.

prevent

Validates inputs to block malicious XSS payloads from being accepted and stored via the CSRF vector.

prevent

Filters outputs to neutralize stored XSS payloads before they are rendered and executed in users' browsers.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remote CSRF-to-stored-XSS vulnerability in a public-facing WordPress plugin, directly enabling exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Cross-Site Request Forgery (CSRF) vulnerability in FuzzGuard Style Admin style-admin allows Stored XSS.This issue affects Style Admin: from n/a through <= 1.4.3.

Deeper analysisAI

CVE-2025-23801 is a Cross-Site Request Forgery (CSRF) vulnerability in the FuzzGuard Style Admin (style-admin) WordPress plugin that allows Stored Cross-Site Scripting (XSS). This issue affects all versions of the plugin from n/a through 1.4.3 inclusive. Published on 2025-01-16, the vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) and maps to CWE-352.

Remote attackers without privileges can exploit this vulnerability by tricking authenticated users, such as site administrators, into interacting with a malicious webpage (UI:R). This user interaction enables a CSRF attack that results in the storage of XSS payloads on the target site, potentially leading to low-level impacts on confidentiality, integrity, and availability with a changed scope (S:C).

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/style-admin/vulnerability/wordpress-style-admin-plugin-1-4-3-csrf-to-stored-xss-vulnerability?_s_id=cve details the CSRF-to-Stored XSS vulnerability in the Style Admin WordPress plugin version 1.4.3 and earlier.

Details

CWE(s)

CVEs Like This One

CVE-2025-2319Shared CWE-352
CVE-2025-23803Shared CWE-352
CVE-2025-25071Shared CWE-352
CVE-2025-23821Shared CWE-352
CVE-2025-30615Shared CWE-352
CVE-2025-22814Shared CWE-352
CVE-2025-28857Shared CWE-352
CVE-2025-28883Shared CWE-352
CVE-2025-27912Shared CWE-352
CVE-2025-31435Shared CWE-352

References