Cyber Posture

CVE-2025-24680

High

Published: 27 January 2025

Published
27 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0018 39.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24680 is a high-severity Basic XSS (CWE-80) vulnerability in Wpexperts Wp Multi Store Locator. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Spearphishing Link (T1566.002); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Spearphishing Link (T1566.002) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper neutralization of script-related HTML tags by filtering web page outputs to prevent reflected XSS execution.

prevent

Validates reflected inputs from unauthenticated users to reject malicious script payloads before they reach the vulnerable plugin code.

prevent

Mandates timely flaw remediation through updating the WP Multistore Locator plugin beyond version 2.4.7 to eliminate the XSS vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

Reflected XSS enables crafted malicious links for payload delivery (spearphishing) and direct exfiltration of session tokens via injected scripts.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WPExperts.io WP Multistore Locator wp-multi-store-locator allows Reflected XSS.This issue affects WP Multistore Locator: from n/a through <= 2.4.7.

Deeper analysisAI

CVE-2025-24680 is an Improper Neutralization of Script-Related HTML Tags in a Web Page vulnerability, classified as Basic XSS and enabling Reflected XSS, in the WP Multistore Locator plugin (wp-multi-store-locator) from WPExperts.io. This issue affects the plugin from unknown initial versions through version 2.4.7 inclusive, as used in WordPress environments.

The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating exploitation over the network with low attack complexity, no required privileges, but needing user interaction such as clicking a malicious link. Any unauthenticated remote attacker can deliver crafted payloads via reflected inputs, achieving changed scope with low impacts on confidentiality, integrity, and availability—potentially allowing session token theft, phishing, or limited site defacement on behalf of the interacting user.

The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/wp-multi-store-locator/vulnerability/wordpress-wp-multi-store-locator-plugin-2-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve) documents this WordPress plugin issue and highlights the need to address versions up to 2.4.7, with mitigation centered on updating the plugin to a non-vulnerable release.

Details

CWE(s)

Affected Products

wpexperts
wp multi store locator
≤ 2.5.1

CVEs Like This One

CVE-2025-0521Same vendor: Wpexperts
CVE-2025-25133Shared CWE-79
CVE-2025-25090Shared CWE-79
CVE-2025-23519Shared CWE-79
CVE-2025-23441Shared CWE-79
CVE-2025-22800Same vendor: Wpexperts
CVE-2025-23545Shared CWE-79
CVE-2025-23753Shared CWE-79
CVE-2024-13497Shared CWE-79, CWE-80
CVE-2026-33080Shared CWE-79, CWE-80

References