CVE-2026-25352
Published: 25 March 2026
Summary
CVE-2026-25352 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Spearphishing Link (T1566.002); ranked at the 11.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper neutralization of input during web page generation by requiring filtering of outputs to prevent reflected XSS execution.
Validates user-supplied inputs to reject or sanitize malicious JavaScript payloads that enable reflected XSS in the MyDecor theme.
Mandates timely identification and patching of flaws like this reflected XSS vulnerability by updating the MyDecor theme to version 1.5.9 or later.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS enables crafting malicious links (T1566.002) that execute arbitrary JavaScript (T1059.007) in the victim's browser, directly facilitating session hijacking (T1185) and data theft as described.
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup MyDecor mydecor allows Reflected XSS.This issue affects MyDecor: from n/a through < 1.5.9.
Deeper analysisAI
CVE-2026-25352 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as CWE-79, enabling Reflected Cross-site Scripting (XSS) in the skygroup MyDecor WordPress theme. This issue affects MyDecor versions from n/a through those prior to 1.5.9. Published on 2026-03-25, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to network accessibility, low complexity, no required privileges, user interaction, and changed scope with low impacts across confidentiality, integrity, and availability.
Remote attackers without privileges can exploit this vulnerability by crafting malicious inputs that reflect unsanitized user-supplied data in web page generation, tricking victims into interacting via phishing links or similar vectors. Successful exploitation executes arbitrary JavaScript in the victim's browser context, potentially leading to session hijacking, data theft, or further site compromise, though impacts remain low per the CVSS metrics.
The Patchstack advisory recommends updating the MyDecor theme to version 1.5.9 or later, where the reflected XSS vulnerability is addressed. No other mitigations are specified in available references.
Details
- CWE(s)