Cyber Posture

CVE-2025-24559

High

Published: 03 February 2025

Published
03 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0004 12.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24559 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Wpmailster Wp Mailster. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses reflected XSS by requiring output filtering to neutralize malicious scripts before rendering in victims' browsers.

prevent

Prevents exploitation by validating and sanitizing user inputs to block improper neutralization during web page generation.

prevent

Ensures timely patching of the specific flaw in WP Mailster plugin versions through 1.8.15.0 to remediate the XSS vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Reflected XSS in public-facing WordPress plugin directly enables exploitation of web application and arbitrary JavaScript execution in victim's browser.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in brandtoss WP Mailster wp-mailster allows Reflected XSS.This issue affects WP Mailster: from n/a through <= 1.8.15.0.

Deeper analysisAI

CVE-2025-24559 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the WP Mailster WordPress plugin developed by brandtoss (wp-mailster). This issue affects the plugin from unspecified initial versions through 1.8.15.0.

The vulnerability can be exploited by a remote attacker requiring no privileges (PR:N), over the network (AV:N) with low complexity (AC:L), though it demands user interaction (UI:R), such as clicking a malicious link. Successful exploitation changes scope (S:C) and results in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), yielding a CVSS v3.1 base score of 7.1. Attackers could inject and execute arbitrary scripts in victims' browsers.

Patchstack's advisory (https://patchstack.com/database/Wordpress/Plugin/wp-mailster/vulnerability/wordpress-wp-mailster-plugin-1-8-15-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) documents the Reflected XSS in WP Mailster 1.8.15.0 and covers mitigation details for affected WordPress installations.

Details

CWE(s)

Affected Products

wpmailster
wp mailster
≤ 1.8.16

CVEs Like This One

CVE-2025-24598Same product: Wpmailster Wp Mailster
CVE-2025-22303Same product: Wpmailster Wp Mailster
CVE-2026-2101Shared CWE-79
CVE-2024-26006Shared CWE-79
CVE-2025-7760Shared CWE-79
CVE-2026-24948Shared CWE-79
CVE-2025-22709Shared CWE-79
CVE-2026-27614Shared CWE-79
CVE-2025-23689Shared CWE-79
CVE-2025-23760Shared CWE-79

References