Cyber Posture

CVE-2025-28855

High

Published: 26 March 2025

Published
26 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0067 71.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-28855 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked in the top 28.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Drive-by Compromise (T1189). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates validation of information inputs to the Teleport WordPress plugin, directly preventing improper neutralization leading to reflected XSS exploitation.

prevent

SI-15 enforces output filtering for web page generation in the Teleport plugin, blocking execution of injected scripts in users' browsers.

prevent

SI-2 requires timely remediation of flaws like CVE-2025-28855 in the Teleport plugin through identification, reporting, and patching.

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
Why these techniques?

Reflected XSS in a public-facing WordPress plugin allows an attacker to craft a malicious link that, when visited by a user, injects and executes arbitrary scripts in the browser context. This directly matches Drive-by Compromise (T1189), where victims are tricked into visiting a site that delivers malicious client-side code.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in srcoley Teleport teleport allows Reflected XSS.This issue affects Teleport: from n/a through <= 1.2.4.

Deeper analysisAI

CVE-2025-28855 is an Improper Neutralization of Input During Web Page Generation vulnerability, enabling Reflected Cross-site Scripting (XSS) as classified under CWE-79. It affects the Teleport WordPress plugin developed by srcoley, with vulnerable versions spanning from n/a through 1.2.4.

The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating network accessibility, low attack complexity, no required privileges, and user interaction such as clicking a malicious link. Remote attackers can exploit it to inject and execute arbitrary scripts in a user's browser context, potentially leading to limited impacts on confidentiality, integrity, and availability within a changed scope.

Patchstack's advisory documents this Reflected XSS issue specifically in Teleport plugin version 1.2.4, providing details on the vulnerability for WordPress environments.

Details

CWE(s)

CVEs Like This One

CVE-2025-23714Shared CWE-79
CVE-2025-68871Shared CWE-79
CVE-2025-22594Shared CWE-79
CVE-2025-23852Shared CWE-79
CVE-2025-30223Shared CWE-79
CVE-2026-22438Shared CWE-79
CVE-2025-26586Shared CWE-79
CVE-2025-46410Shared CWE-79
CVE-2025-23489Shared CWE-79
CVE-2026-28113Shared CWE-79

References