CVE-2025-48143
BaseFortify
Publication date: 2025-06-09
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-48143 is a reflected Cross Site Scripting (XSS) vulnerability in the WordPress plugin "Formulario de contacto SalesUp!" versions up to 1.0.14. It allows unauthenticated attackers to inject malicious scripts into websites using the plugin. These scripts execute when visitors access the compromised site, potentially causing unauthorized actions or content manipulation. [1]
How can this vulnerability impact me? :
This vulnerability can lead to attackers injecting malicious scripts that execute in the browsers of site visitors. This can result in unauthorized actions such as redirects, displaying unwanted advertisements, or manipulation of website content. It poses a moderate risk and can compromise the integrity and trustworthiness of the affected website. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for reflected Cross Site Scripting (XSS) attack attempts targeting the Formulario de contacto SalesUp! plugin. Since it involves injection of malicious scripts in web requests, you can look for suspicious HTTP requests containing script tags or typical XSS payloads in URL parameters or form inputs related to the plugin. Specific commands are not provided in the resources, but using web application firewall (WAF) logs or tools like curl or Burp Suite to send crafted requests and observe responses may help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying the virtual patch (vPatch) released by Patchstack, which automatically blocks attack attempts exploiting this vulnerability until an official fix is available. Site administrators should promptly deploy this virtual patch to protect their sites. Additionally, monitoring for signs of compromise and seeking professional incident response if exploitation is suspected are recommended. [1]