Cyber Posture

CVE-2026-25342

High

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0004 11.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25342 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-15 (Information Output Filtering) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 4 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the reflected XSS vulnerability by requiring timely patching to Boutique theme version 2.4.6 or later.

prevent

Prevents exploitation by filtering or encoding unneutralized user inputs during web page generation to block script execution.

prevent

Addresses the vulnerability by validating inputs to reject or sanitize malicious XSS payloads before reflection.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

Reflected XSS in public-facing WordPress theme enables remote exploitation (T1190) via crafted malicious links delivered by spearphishing (T1566.002/T1204.001), directly facilitating arbitrary JavaScript execution (T1059.007) and session cookie theft (T1539).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kutethemes Boutique kute-boutique allows Reflected XSS.This issue affects Boutique: from n/a through < 2.4.6.

Deeper analysisAI

CVE-2026-25342 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as CWE-79 (Cross-site Scripting), specifically a Reflected XSS issue in the kutethemes Boutique (kute-boutique) WordPress theme. It affects all versions of the Boutique theme from n/a through those prior to 2.4.6. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility, low attack complexity, no required privileges, user interaction, and changed scope with low impacts on confidentiality, integrity, and availability.

Attackers can exploit this vulnerability remotely over the network without authentication by crafting malicious input that is reflected back in the web page without proper neutralization. Exploitation requires tricking an authenticated user, such as a site visitor or administrator, into interacting with a malicious link or payload (e.g., via phishing or social engineering). Successful exploitation allows the attacker to execute arbitrary scripts in the victim's browser context, potentially stealing session cookies, sensitive data, or performing actions on behalf of the user within the site's scope, leveraging the changed scope for broader impact.

The Patchstack advisory for this vulnerability confirms it was addressed in Boutique theme version 2.4.6, recommending immediate updates to patched versions for mitigation. Security practitioners should verify theme versions on affected WordPress sites and apply the update, while also implementing general XSS protections like Content Security Policy (CSP) headers where possible.

Details

CWE(s)

CVEs Like This One

CVE-2025-23447Shared CWE-79
CVE-2026-42366Shared CWE-79
CVE-2025-67952Shared CWE-79
CVE-2025-23853Shared CWE-79
CVE-2026-7371Shared CWE-79
CVE-2026-32529Shared CWE-79
CVE-2025-23835Shared CWE-79
CVE-2025-28877Shared CWE-79
CVE-2025-68842Shared CWE-79
CVE-2026-33135Shared CWE-79

References