CVE-2025-25166
Published: 07 February 2025
Summary
CVE-2025-25166 is a high-severity CSRF (CWE-352) vulnerability in Gabrieldarezzo Inlocation. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-23 enforces session authenticity protections like anti-CSRF tokens, directly preventing forged requests that store XSS payloads in the vulnerable InLocation plugin endpoints.
SI-10 requires validation of information inputs, blocking malicious XSS payloads from being stored via the CSRF-vulnerable endpoints in the InLocation plugin.
SI-2 mandates timely identification and remediation of flaws, such as patching the InLocation WordPress plugin versions up to 1.8 affected by this CSRF-to-Stored XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CSRF to stored XSS in public-facing WordPress plugin directly enables T1190 for exploitation; resulting persistent client-side script execution facilitates T1189 drive-by compromise on visitors.
NVD Description
Cross-Site Request Forgery (CSRF) vulnerability in gabrieldarezzo InLocation inlocation allows Stored XSS.This issue affects InLocation: from n/a through <= 1.8.
Deeper analysisAI
CVE-2025-25166 is a Cross-Site Request Forgery (CSRF) vulnerability, mapped to CWE-352, in the InLocation WordPress plugin developed by gabrieldarezzo. The flaw affects InLocation versions from unknown initial release through 1.8 and enables Stored Cross-Site Scripting (XSS) via CSRF-protected endpoints.
With a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), the vulnerability is exploitable over the network by unauthenticated attackers requiring low complexity and user interaction. An attacker can lure authenticated users to a malicious site that forges a request to store an XSS payload, which executes in the browser context of subsequent users viewing affected content, enabling low-level impacts on confidentiality, integrity, and availability such as script injection or data exfiltration.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/inlocation/vulnerability/wordpress-inlocation-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve provides details on the issue in the WordPress InLocation plugin version 1.8. Security practitioners should review this reference for recommended mitigations and patch information.
Details
- CWE(s)