CVE-2026-25461
Published: 25 March 2026
Summary
CVE-2026-25461 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Spearphishing Link (T1566.002); ranked at the 11.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Filters malicious scripts from web page output, directly preventing reflected XSS execution in the victim's browser.
Validates and neutralizes untrusted inputs during web page generation, addressing the improper neutralization flaw in Listeo Core.
Remediates the specific XSS vulnerability by patching the Listeo Core plugin to version beyond 2.0.21.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS enables exploitation via crafted malicious links (T1566.002/T1204.001) that trigger arbitrary JavaScript execution (T1059.007) in the victim's browser, directly facilitating session hijacking and cookie theft (T1185/T1539).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in purethemes Listeo Core listeo-core allows Reflected XSS.This issue affects Listeo Core: from n/a through <= 2.0.21.
Deeper analysisAI
CVE-2026-25461 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Listeo Core plugin (listeo-core) developed by purethemes for WordPress. This issue affects Listeo Core versions from n/a through 2.0.21, as published on 2026-03-25 with a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
An unauthenticated attacker with network access can exploit this vulnerability by crafting malicious input that is reflected back in the web page generation process. Exploitation requires low complexity and user interaction, such as tricking a victim into clicking a malicious link or submitting tainted input. Successful attacks enable script execution in the victim's browser context with changed scope, resulting in low impacts to confidentiality, integrity, and availability, such as potential session hijacking or data theft.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/listeo-core/vulnerability/wordpress-listeo-core-plugin-2-0-21-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve documents this Reflected XSS vulnerability in the WordPress Listeo Core plugin up to version 2.0.21.
Details
- CWE(s)