CVE-2025-31039

| EUVD-2025-17490 CRITICAL
2025-06-09 [email protected]
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17490
CVE Published
Jun 09, 2025 - 16:15 nvd
CRITICAL 9.1

Tags

Description

Improper Restriction of XML External Entity Reference vulnerability in pixelgrade Category Icon allows XML Entity Linking. This issue affects Category Icon: from n/a through 1.0.2.

Analysis

CVE-2025-31039 is an XML External Entity (XXE) injection vulnerability in the Pixelgrade Category Icon WordPress plugin (versions through 1.0.2) that allows authenticated attackers with high privileges to read arbitrary files, execute remote code, or cause denial of service through improper XML entity validation. The vulnerability has a critical CVSS score of 9.1 but requires administrator-level privileges to exploit; active exploitation status and proof-of-concept availability are not confirmed from the provided intelligence.

Technical Context

This vulnerability exploits CWE-611 (Improper Restriction of XML External Entity Reference), a class of attacks where XML parsers are configured to process external entity definitions without proper validation. The Category Icon plugin likely processes XML input (potentially from user-uploaded files, plugin configuration, or API responses) without disabling XXE protections in its XML parser. This could affect PHP's SimpleXML, DOMDocument, or similar parsing libraries. The 'XML Entity Linking' description suggests the vulnerability allows attackers to define custom entity references pointing to local files (file:// protocol) or remote resources, enabling information disclosure or server-side request forgery (SSRF). The affected product is CPE wp:plugin:pixelgrade-category-icon through version 1.0.2; remediation likely requires updating to a patched version (not specified in provided data) or disabling XXE processing via PHP configuration (libxml_disable_entity_loader, etc.).

Affected Products

Category Icon (1.0.2 and earlier)

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +46
POC: 0

Share

CVE-2025-31039 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy