CVE-2025-58920

| EUVD-2025-209404 HIGH
2026-04-10 Patchstack GHSA-whm2-488f-jvqp
7.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

3
EUVD ID Assigned
Apr 10, 2026 - 13:45 euvd
EUVD-2025-209404
Analysis Generated
Apr 10, 2026 - 13:45 vuln.today
CVE Published
Apr 10, 2026 - 13:25 nvd
HIGH 7.1

Tags

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zootemplate Cerato allows Reflected XSS.This issue affects Cerato: from n/a through 2.2.18.

Analysis

Reflected cross-site scripting in Zootemplate Cerato WordPress theme versions through 2.2.18 allows unauthenticated attackers to execute arbitrary JavaScript in victim browsers through crafted malicious links. Successful exploitation requires user interaction (victim must click attacker-controlled URL). Attack enables session hijacking, credential theft, and defacement within changed security context. No public exploit identified at time of analysis.

Technical Context

Reflected XSS (CWE-79) stems from improper neutralization of user-supplied input before rendering in web pages. Attacker-controlled parameters are reflected in HTTP responses without sanitization or encoding. CVSS vector PR:N confirms unauthenticated attack surface; S:C indicates scope change enabling context escalation beyond vulnerable component.

Affected Products

Zootemplate Cerato WordPress theme, all versions through 2.2.18. CPE: cpe:2.3:a:zootemplate:cerato:*:*:*:*:*:*:*:*

Remediation

No vendor-released patch identified at time of analysis. Immediately deactivate Cerato theme and migrate to actively maintained alternative with vendor security support. If business continuity requires temporary continued use, implement web application firewall rules to sanitize all user-controllable parameters in HTTP requests, enforce Content Security Policy headers restricting inline script execution, and educate users against clicking untrusted links. Monitor Patchstack advisory for vendor patch announcements: https://patchstack.com/database/wordpress/theme/cerato/vulnerability/wordpress-cerato-theme-2-2-18-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve. Verify theme developer security contact channels for direct patch notification.

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

CVE-2025-58920 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy