CVE-2025-30555
Published: 24 March 2025
Summary
CVE-2025-30555 is a high-severity CSRF (CWE-352) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-23 enforces session authenticity through mechanisms like anti-CSRF tokens, directly preventing the unauthorized state-changing requests that enable this CSRF-to-stored XSS exploit.
SI-10 validates information inputs to block malicious XSS payloads from being accepted and stored server-side via the CSRF attack.
SI-15 filters information outputs to neutralize and prevent execution of any stored XSS payloads injected through the CSRF vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability exists in a public-facing WordPress plugin, directly enabling remote exploitation of a web application (T1190). Exploitation requires tricking an authenticated victim into visiting a malicious site to trigger the CSRF payload, mapping to spearphishing via a malicious link (T1566.002).
NVD Description
Cross-Site Request Forgery (CSRF) vulnerability in iiiryan WordPres 同步微博 wp2wb allows Stored XSS.This issue affects WordPres 同步微博: from n/a through <= 1.1.0.
Deeper analysisAI
CVE-2025-30555 is a Cross-Site Request Forgery (CSRF) vulnerability in the iiiryan WordPress 同步微博 wp2wb plugin that allows Stored XSS. This issue affects WordPress 同步微博 versions from n/a through <= 1.1.0.
An unauthenticated attacker (AV:N, PR:N) can exploit the vulnerability over the network (AC:L) by tricking a victim into performing an action via user interaction (UI:R), such as visiting a malicious site. Successful exploitation changes the scope (S:C) and enables stored XSS, resulting in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), as scored at CVSS 7.1 (CVSS:3.1).
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/wp2wb/vulnerability/wordpress-wordpres-plugin-1-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve provides further details on the vulnerability.
Details
- CWE(s)