CVE-2025-23994
Published: 21 January 2025
Summary
CVE-2025-23994 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation and neutralization of inputs at entry points to block malicious script injection via the CSRF-to-stored XSS vector in the Estatebud plugin.
Mandates output filtering during web page generation to prevent execution of stored malicious scripts when affected pages are viewed by users.
Directly facilitates identification, reporting, and patching of the specific flaw in Estatebud plugin versions up to 5.5.0.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS in public-facing WordPress plugin directly enables exploitation of the web application (T1190) and facilitates drive-by compromise by injecting executable scripts into pages viewed by users (T1189).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Estatebud Estatebud – Properties & Listings estatebud-properties-listings allows Stored XSS.This issue affects Estatebud – Properties & Listings: from n/a through <= 5.5.0.
Deeper analysisAI
CVE-2025-23994, published on 2025-01-21, is an Improper Neutralization of Input During Web Page Generation vulnerability, enabling Stored Cross-site Scripting (XSS) as classified under CWE-79. It affects the Estatebud – Properties & Listings WordPress plugin (estatebud-properties-listings) in all versions up to and including 5.5.0.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network-accessible exploitation with low attack complexity, no required privileges, and user interaction needed. Unauthenticated attackers can leverage a CSRF-to-Stored XSS vector to inject and store malicious scripts, which execute in the context of other users viewing affected pages, resulting in low impacts to confidentiality, integrity, and availability under a changed scope.
The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/estatebud-properties-listings/vulnerability/wordpress-estatebud-properties-listings-plugin-5-5-0-csrf-to-stored-xss-vulnerability?_s_id=cve) documents the CSRF-to-Stored XSS issue in Estatebud – Properties & Listings version 5.5.0 and earlier, providing vulnerability details for mitigation.
Details
- CWE(s)