CVE-2025-31585
Published: 31 March 2025
Summary
CVE-2025-31585 is a high-severity CSRF (CWE-352) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents CSRF exploitation in the Leadfox plugin by requiring session authenticity mechanisms such as anti-CSRF tokens or SameSite cookies to validate forged requests.
Ensures timely flaw remediation by patching the specific CSRF-to-stored XSS vulnerability affecting Leadfox for WordPress versions through 2.1.9.
Addresses the stored XSS aspect of the CSRF vulnerability by validating and sanitizing inputs injected via forged requests.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CSRF-to-stored XSS in public-facing WordPress plugin directly enables T1190 (exploit public-facing app) and T1059.007 (JavaScript execution via injected XSS payload).
NVD Description
Cross-Site Request Forgery (CSRF) vulnerability in leadfox Leadfox for WordPress leadfox allows Cross Site Request Forgery.This issue affects Leadfox for WordPress: from n/a through <= 2.1.9.
Deeper analysisAI
CVE-2025-31585 is a Cross-Site Request Forgery (CSRF) vulnerability, mapped to CWE-352, in the Leadfox for WordPress plugin. It affects all versions from n/a through 2.1.9. Published on 2025-03-31T13:15:51.710, the vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Attackers can exploit this over the network with low complexity and no required privileges, though user interaction is needed. Exploitation involves tricking an authenticated user, such as a site administrator, into performing unintended actions via a forged request, potentially leading to low-level impacts on confidentiality, integrity, and availability with a changed scope.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/leadfox/vulnerability/wordpress-leadfox-for-wordpress-plugin-2-1-8-csrf-to-stored-xss-vulnerability?_s_id=cve describes it as a CSRF-to-stored XSS issue specifically in version 2.1.8; security practitioners should review it for detailed mitigation guidance, such as updating the plugin.
Details
- CWE(s)