Cyber Posture

CVE-2025-28857

High

Published: 11 March 2025

Published
11 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0008 23.5th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-28857 is a high-severity CSRF (CWE-352) vulnerability in Rankchecker Rankchecker. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the CSRF to Stored XSS vulnerability in the Rankchecker.io Integration plugin through timely identification, reporting, and patching of flaws.

prevent

Enforces session authenticity mechanisms such as anti-CSRF tokens to prevent unauthorized cross-site requests that exploit this vulnerability.

prevent

Validates all information inputs to block malicious XSS payloads from being stored via the CSRF exploitation vector.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remotely exploitable CSRF-to-stored-XSS flaw in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application (T1190) via a crafted link that triggers persistent script injection.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Cross-Site Request Forgery (CSRF) vulnerability in rankchecker Rankchecker.io Integration rankchecker-io-integration allows Stored XSS.This issue affects Rankchecker.io Integration: from n/a through <= 1.0.9.

Deeper analysisAI

CVE-2025-28857 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Rankchecker.io Integration WordPress plugin (rankchecker-io-integration). This flaw allows for Stored Cross-Site Scripting (XSS) and affects all versions from n/a through 1.0.9. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility and scope change.

Attackers can exploit this vulnerability remotely over the network with low attack complexity and no required privileges, though it necessitates user interaction, such as a victim administrator clicking a crafted link. Exploitation enables CSRF to trigger Stored XSS, allowing attackers to inject malicious scripts that persist and execute in the context of the affected site, potentially leading to low-level impacts on confidentiality, integrity, and availability.

Patchstack has documented this CSRF to Stored XSS vulnerability specifically in Rankchecker.io Integration plugin version 1.0.9, providing details for WordPress security practitioners at https://patchstack.com/database/Wordpress/Plugin/rankchecker-io-integration/vulnerability/wordpress-rankchecker-io-integration-plugin-1-0-9-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve.

Details

CWE(s)

Affected Products

rankchecker
rankchecker
≤ 1.0.9

CVEs Like This One

CVE-2025-2319Shared CWE-352
CVE-2025-23803Shared CWE-352
CVE-2025-25071Shared CWE-352
CVE-2025-23821Shared CWE-352
CVE-2025-30615Shared CWE-352
CVE-2025-22814Shared CWE-352
CVE-2025-28883Shared CWE-352
CVE-2025-27912Shared CWE-352
CVE-2025-31435Shared CWE-352
CVE-2025-31623Shared CWE-352

References