Stored XSS Vulnerability in LikeBot WordPress Plugin by WPCrafter
CVE-2025-0522

4.7MEDIUM

Key Information:

Vendor
WordPress
Status
Vendor
CVE Published:
6 February 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The LikeBot WordPress plugin, up to version 0.85, is vulnerable due to the absence of Cross-Site Request Forgery (CSRF) checks in multiple locations. This lack of validation allows attackers to exploit the vulnerability and trick logged-in administrators into adding malicious Stored XSS payloads. Furthermore, the plugin lacks proper data sanitization and escaping mechanisms, exacerbating the security risk. Administrators need to take caution as this could lead to unauthorized actions on behalf of users, potentially compromising the integrity of the website.

Affected Version(s)

LikeBot 0 <= 0.85

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4.7
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bob Matyas
WPScan
.