CVE-2025-28855
Published: 26 March 2025
Summary
CVE-2025-28855 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked in the top 28.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates validation of information inputs to the Teleport WordPress plugin, directly preventing improper neutralization leading to reflected XSS exploitation.
SI-15 enforces output filtering for web page generation in the Teleport plugin, blocking execution of injected scripts in users' browsers.
SI-2 requires timely remediation of flaws like CVE-2025-28855 in the Teleport plugin through identification, reporting, and patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS in a public-facing WordPress plugin allows an attacker to craft a malicious link that, when visited by a user, injects and executes arbitrary scripts in the browser context. This directly matches Drive-by Compromise (T1189), where victims are tricked into visiting a site that delivers malicious client-side code.
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in srcoley Teleport teleport allows Reflected XSS.This issue affects Teleport: from n/a through <= 1.2.4.
Deeper analysisAI
CVE-2025-28855 is an Improper Neutralization of Input During Web Page Generation vulnerability, enabling Reflected Cross-site Scripting (XSS) as classified under CWE-79. It affects the Teleport WordPress plugin developed by srcoley, with vulnerable versions spanning from n/a through 1.2.4.
The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, and user interaction such as clicking a malicious link. Remote attackers can exploit it to inject and execute arbitrary scripts in a user's browser context, potentially leading to limited impacts on confidentiality, integrity, and availability within a changed scope.
Patchstack's advisory documents this Reflected XSS issue specifically in Teleport plugin version 1.2.4, providing details on the vulnerability for WordPress environments.
Details
- CWE(s)