CVE-2025-48333
BaseFortify
Publication date: 2025-06-17
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-48333 is a Cross Site Scripting (XSS) vulnerability in the WordPress eForm - WordPress Form Builder plugin versions before 4.19.1. It allows unauthenticated attackers to inject malicious scripts such as redirects, advertisements, or other HTML payloads into websites using the vulnerable plugin. These scripts execute when site visitors access the compromised pages, potentially causing various malicious effects. The vulnerability is classified as an injection flaw under the OWASP Top 10 category A3. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to inject and execute malicious scripts on your website without needing authentication. These scripts can redirect visitors, display unwanted advertisements, or perform other harmful actions. This can lead to compromised user experience, loss of trust, potential data theft, and further exploitation of your site. Because the vulnerability is exploitable remotely and without authentication, it poses a significant risk to any site running the affected plugin version. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of CVE-2025-48333 involves monitoring for reflected XSS attack patterns targeting the WordPress eForm plugin versions before 4.19.1. While specific commands are not provided, it is recommended to perform server-side malware scanning and professional incident response to identify potential compromises. Network monitoring tools can be configured to look for suspicious script injections or unusual HTTP requests containing malicious payloads targeting the vulnerable plugin endpoints. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying the official update to version 4.19.1 or later of the WordPress eForm plugin, which fixes the vulnerability. Until the update can be applied, use the virtual patch (vPatch) provided by Patchstack to block attacks automatically. Additionally, conduct professional incident response and server-side malware scanning if compromise is suspected. Avoid relying solely on plugin-based malware scanners as they can be tampered with by attackers. [1]