CVE-2025-24593
Published: 27 January 2025
Summary
CVE-2025-24593 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Wisdmlabs Edwiser Bridge. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates reflected XSS by filtering information outputs to neutralize malicious scripts before web page generation.
Prevents exploitation by validating and sanitizing untrusted inputs to block injection of malicious scripts into the WordPress plugin.
Addresses the specific flaw in Edwiser Bridge versions through <=3.0.8 by identifying, reporting, and applying timely remediation such as patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in public-facing WordPress plugin directly enables exploitation of public-facing applications (T1190) and malicious script injection to capture input from web portals (T1056.003).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WisdmLabs Edwiser Bridge edwiser-bridge allows Reflected XSS.This issue affects Edwiser Bridge: from n/a through <= 3.0.8.
Deeper analysisAI
CVE-2025-24593 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the WisdmLabs Edwiser Bridge (edwiser-bridge) WordPress plugin. It affects all versions from n/a through 3.0.8. Published on 2025-01-27, the issue has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Attackers can exploit this vulnerability remotely over the network with low complexity and no required privileges, though it demands user interaction such as clicking a malicious link. Scope changes upon successful exploitation (S:C), enabling low-level impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). This allows injection of malicious scripts reflected in dynamically generated web pages.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/edwiser-bridge/vulnerability/wordpress-edwiser-bridge-plugin-3-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve provides details on this Reflected XSS vulnerability in Edwiser Bridge version 3.0.8 for mitigation guidance.
Details
- CWE(s)