CVE-2025-28883
Published: 11 March 2025
Summary
CVE-2025-28883 is a high-severity CSRF (CWE-352) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the specific CSRF to stored XSS flaw in the WP Compare Tables plugin, preventing exploitation of CVE-2025-28883.
Enforces session authenticity mechanisms like anti-CSRF tokens to block unauthorized state-changing requests tricked via CSRF.
Validates inputs against malicious script injection during the CSRF-facilitated state change, preventing stored XSS payload persistence.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CSRF to stored XSS vulnerability in the public-facing WordPress plugin directly enables exploitation of a public-facing application (T1190).
NVD Description
Cross-Site Request Forgery (CSRF) vulnerability in Martin WP Compare Tables wp-compare-tables allows Stored XSS.This issue affects WP Compare Tables: from n/a through <= 1.0.5.
Deeper analysisAI
CVE-2025-28883 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the WP Compare Tables plugin (wp-compare-tables) for WordPress, developed by Martin. This flaw enables Stored Cross-Site Scripting (XSS). It affects all versions of the plugin from n/a through 1.0.5 inclusive. The vulnerability received a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) and was published on 2025-03-11.
Attackers require network access but no privileges (PR:N) and can exploit the issue with low complexity (AC:L), though user interaction is required (UI:R). Exploitation changes scope (S:C) and allows low-level impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). Specifically, the CSRF condition facilitates stored XSS, where an attacker can trick an authenticated user—likely an administrator—into performing a state-changing action that injects and persists malicious scripts on the site.
The Patchstack advisory provides further details on this vulnerability, including vulnerability assessment and recommended actions, accessible at https://patchstack.com/database/Wordpress/Plugin/wp-compare-tables/vulnerability/wordpress-wp-compare-tables-plugin-1-0-5-csrf-to-stored-xss-vulnerability?_s_id=cve.
Details
- CWE(s)