CVE-2025-24700
Published: 14 February 2025
Summary
CVE-2025-24700 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Xylusthemes Wp Event Aggregator. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 enforces validation of information inputs, directly preventing the improper neutralization of malicious payloads in the WP Event Aggregator plugin that enables reflected XSS.
SI-15 requires filtering of information outputs, mitigating the reflection of unsanitized user input into web pages during generation in the vulnerable plugin.
SI-2 mandates identification and timely remediation of system flaws, such as patching the WP Event Aggregator plugin versions through 1.8.2 affected by this XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in public-facing WordPress plugin allows crafting malicious URLs for JS execution in victim's browser, mapping to exploitation of public-facing apps (T1190) and delivery via spearphishing links (T1566.002).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xylus Themes WP Event Aggregator wp-event-aggregator allows Reflected XSS.This issue affects WP Event Aggregator: from n/a through <= 1.8.2.
Deeper analysisAI
CVE-2025-24700 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, affecting the WP Event Aggregator WordPress plugin from Xylus Themes. This issue impacts all versions of the plugin from n/a through 1.8.2.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), meaning it is exploitable remotely over the network with low attack complexity, no required privileges, but necessitating user interaction such as clicking a malicious link. An unauthenticated attacker can craft a URL containing a malicious payload that the plugin reflects unsanitized into the web page, enabling arbitrary JavaScript execution in the context of the victim's browser and potentially leading to low-level impacts on confidentiality, integrity, and availability across a changed scope.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/wp-event-aggregator/vulnerability/wordpress-wp-event-aggregator-plugin-1-8-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve provides further details on the vulnerability in WP Event Aggregator version 1.8.2.
Details
- CWE(s)