CVE-2025-24559
Published: 03 February 2025
Summary
CVE-2025-24559 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Wpmailster Wp Mailster. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses reflected XSS by requiring output filtering to neutralize malicious scripts before rendering in victims' browsers.
Prevents exploitation by validating and sanitizing user inputs to block improper neutralization during web page generation.
Ensures timely patching of the specific flaw in WP Mailster plugin versions through 1.8.15.0 to remediate the XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in public-facing WordPress plugin directly enables exploitation of web application and arbitrary JavaScript execution in victim's browser.
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in brandtoss WP Mailster wp-mailster allows Reflected XSS.This issue affects WP Mailster: from n/a through <= 1.8.15.0.
Deeper analysisAI
CVE-2025-24559 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the WP Mailster WordPress plugin developed by brandtoss (wp-mailster). This issue affects the plugin from unspecified initial versions through 1.8.15.0.
The vulnerability can be exploited by a remote attacker requiring no privileges (PR:N), over the network (AV:N) with low complexity (AC:L), though it demands user interaction (UI:R), such as clicking a malicious link. Successful exploitation changes scope (S:C) and results in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), yielding a CVSS v3.1 base score of 7.1. Attackers could inject and execute arbitrary scripts in victims' browsers.
Patchstack's advisory (https://patchstack.com/database/Wordpress/Plugin/wp-mailster/vulnerability/wordpress-wp-mailster-plugin-1-8-15-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) documents the Reflected XSS in WP Mailster 1.8.15.0 and covers mitigation details for affected WordPress installations.
Details
- CWE(s)