King Rayhan Scroll UP EUVD-2025-28461

| CVE-2025-52782 HIGH
Cross-site Scripting (XSS) (CWE-79)
2025-06-20 [email protected]
7.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-28461
CVE Published
Jun 20, 2025 - 15:15 nvd
HIGH 7.1

DescriptionNVD

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in King Rayhan Scroll UP allows Reflected XSS. This issue affects Scroll UP: from n/a through 2.0.

AnalysisAI

CVE-2025-52782 is a Reflected Cross-Site Scripting (XSS) vulnerability in King Rayhan Scroll UP WordPress plugin versions through 2.0 that allows unauthenticated attackers to inject malicious scripts into web pages viewed by users. The vulnerability has a CVSS score of 7.1 (High) with network-based attack vector requiring user interaction; attackers can steal session cookies, perform actions on behalf of users, or redirect users to malicious sites. KEV status and active exploitation data were not provided in available intelligence sources, though the reflected XSS nature suggests moderate real-world exploitability.

Technical ContextAI

CVE-2025-52782 is a CWE-79 (Improper Neutralization of Input During Web Page Generation) vulnerability, specifically a Reflected XSS flaw. The Scroll UP plugin (King Rayhan) fails to properly sanitize and escape user-supplied input before rendering it in HTTP responses. The vulnerability likely exists in URL parameters or form inputs that are directly reflected in HTML/JavaScript contexts without encoding (e.g., missing htmlspecialchars(), wp_kses_post(), or esc_html() in WordPress context). Reflected XSS differs from Stored XSS in that the malicious payload is not persisted in a database but travels in the request itself, requiring social engineering to trick users into clicking malicious links. CPE data indicates the affected component is the 'Scroll UP' plugin by King Rayhan for WordPress, affecting versions from initial release through version 2.0.

RemediationAI

Immediate Actions: (1) Deactivate and remove King Rayhan Scroll UP plugin version 2.0 or earlier from all WordPress installations. (2) Search WordPress plugin repository or King Rayhan's official channels for patched version (2.1 or later); if available, update to the patched version after testing in staging environment. (3) If no patch is available, evaluate alternative 'scroll to top' plugins (e.g., 'Scroll Back to Top', 'WP Scroll Top Button') that are actively maintained. Long-term: (1) Monitor King Rayhan's GitHub or WordPress.org plugin page for security updates and enable automatic updates if available. (2) Implement Web Application Firewall (WAF) rules to detect and block reflected XSS payloads in URL parameters (ModSecurity CRS rule 941110/941120 for XSS detection). (3) Enforce Content Security Policy (CSP) headers with 'script-src' restrictions to limit XSS impact even if payload is injected.

Share

EUVD-2025-28461 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy