CVE-2025-24680
Published: 27 January 2025
Summary
CVE-2025-24680 is a high-severity Basic XSS (CWE-80) vulnerability in Wpexperts Wp Multi Store Locator. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Spearphishing Link (T1566.002); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the improper neutralization of script-related HTML tags by filtering web page outputs to prevent reflected XSS execution.
Validates reflected inputs from unauthenticated users to reject malicious script payloads before they reach the vulnerable plugin code.
Mandates timely flaw remediation through updating the WP Multistore Locator plugin beyond version 2.4.7 to eliminate the XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS enables crafted malicious links for payload delivery (spearphishing) and direct exfiltration of session tokens via injected scripts.
NVD Description
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WPExperts.io WP Multistore Locator wp-multi-store-locator allows Reflected XSS.This issue affects WP Multistore Locator: from n/a through <= 2.4.7.
Deeper analysisAI
CVE-2025-24680 is an Improper Neutralization of Script-Related HTML Tags in a Web Page vulnerability, classified as Basic XSS and enabling Reflected XSS, in the WP Multistore Locator plugin (wp-multi-store-locator) from WPExperts.io. This issue affects the plugin from unknown initial versions through version 2.4.7 inclusive, as used in WordPress environments.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating exploitation over the network with low attack complexity, no required privileges, but needing user interaction such as clicking a malicious link. Any unauthenticated remote attacker can deliver crafted payloads via reflected inputs, achieving changed scope with low impacts on confidentiality, integrity, and availability—potentially allowing session token theft, phishing, or limited site defacement on behalf of the interacting user.
The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/wp-multi-store-locator/vulnerability/wordpress-wp-multi-store-locator-plugin-2-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve) documents this WordPress plugin issue and highlights the need to address versions up to 2.4.7, with mitigation centered on updating the plugin to a non-vulnerable release.
Details
- CWE(s)