CVE-2025-31061

| EUVD-2025-17497 HIGH
Cross-site Scripting (XSS) (CWE-79)
2025-06-09 [email protected]
7.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17497
CVE Published
Jun 09, 2025 - 16:15 nvd
HIGH 7.1

DescriptionNVD

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in redqteam Wishlist allows Reflected XSS. This issue affects Wishlist: from n/a through 2.1.0.

AnalysisAI

Reflected Cross-Site Scripting (XSS) vulnerability in redqteam's Wishlist plugin affecting versions up to 2.1.0. An unauthenticated attacker can craft malicious URLs containing unfiltered input that executes arbitrary JavaScript in a victim's browser when clicked, potentially leading to session hijacking, credential theft, or malware distribution. The vulnerability has a CVSS score of 7.1 (High) with network-based attack vector requiring user interaction; current KEV/EPSS status and active exploitation details are not provided in available intelligence.

Technical ContextAI

This vulnerability stems from CWE-79 (Improper Neutralization of Input During Web Page Generation), a classic web application flaw where user-supplied input is reflected in HTTP responses without proper encoding or sanitization. The Wishlist plugin, developed by redqteam, fails to sanitize query parameters or form inputs before rendering them in the HTML response. Reflected XSS differs from stored XSS in that the payload is not persisted in a database—instead, it lives in the URL itself, making it suitable for social engineering attacks via email or malicious links. The affected product range (n/a through 2.1.0) suggests no previous patches existed or version tracking began after initial vulnerable code. CPE identification would typically be: cpe:2.3:a:redqteam:wishlist:*:*:*:*:*:*:*:* (version range 0-2.1.0), though exact CPE notation is not provided in the vulnerability source.

RemediationAI

  1. Immediate: Update redqteam Wishlist plugin to version 2.1.1 or later once released (verify vendor release notes for patch confirmation). 2. Workarounds (if patch unavailable): Implement Web Application Firewall (WAF) rules to block requests containing common XSS payloads (e.g., <script>, javascript:, onerror=); enforce Content Security Policy (CSP) headers (Content-Security-Policy: default-src 'self'; script-src 'self') to mitigate reflected XSS impact. 3. Mitigation: Disable the Wishlist plugin on production systems until patched; use an alternative plugin with active security maintenance. 4. Developer patch (if vendor unresponsive): Sanitize all user inputs using appropriate encoding (HTML entity encoding for reflected output, htmlspecialchars() in PHP, or framework equivalents). 5. Monitoring: Audit logs for suspicious query parameters; monitor for signs of session hijacking or unauthorized account access.

Share

CVE-2025-31061 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy