Sploit.io - Search

Product: S-DEV SEO, version: >= n/a, <= 1.88

CVE-2025-22744

Severity: MEDIUM

Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob von Bothmer / SeoDev S-DEV SEO allows Stored XSS.This issue affects S-DEV SEO: from n/a through 1.88.

CVSS Score: 6.5

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000910000
  • Percentile: 0.263140000
  • Date: 2025-12-31

ExploitDB

No data available.

HackerOne Data

  • Rank: 8512
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Rob von Bothmer / SeoDev S-DEV SEO - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2025-22744, is a Stored Cross-site Scripting (XSS) vulnerability within the S-DEV SEO WordPress plugin, specifically versions from n/a through 1.88. This means an attacker can inject malicious scripts into the website that will be stored and executed whenever a user visits an affected page. The CVSS v3.1 base score is 6.5 (Medium), indicating a moderate level of risk. The attack vector is network-accessible, and the attack complexity is low, meaning exploitation is relatively easy. Privileges are required, but only at a low level – typically just being a logged-in user with some posting capabilities. User interaction is required, meaning a user needs to visit a page containing the injected script. The scope is changed, indicating the vulnerability can impact the security context of the website. The impact on confidentiality, integrity, and availability is rated as low, meaning while data compromise or disruption is possible, it’s likely to be limited. Business impact could range from defacement of the website to potential theft of user cookies or redirection to malicious sites, impacting user trust and potentially brand reputation. The EPSS score of 0.000910000 suggests a relatively low probability of exploitation in the wild, but the impact, while low, is still significant enough to warrant attention.

    2. Potential Attack Scenarios
    An attacker could exploit this vulnerability by crafting a malicious payload – a piece of JavaScript code – and injecting it into a field within the S-DEV SEO plugin, such as a meta description or a title tag, through a form available to low-privileged users (e.g., authors or editors). For example, an attacker with author access to a WordPress site using S-DEV SEO could create a new post or edit an existing one. Within the meta description field, they inject the following script: <script>alert("XSS Vulnerability!");</script>. When a user visits the post, the JavaScript code will execute, displaying an alert box. More sophisticated attacks could steal user cookies, redirect users to a phishing site, or modify the content of the page. The attack vector is through the website itself, requiring a user to visit a page with the injected script. The attack process involves the attacker crafting and injecting the script, and then a user triggering the execution by visiting the affected page. The potential outcome is a compromised user session, website defacement, or redirection to a malicious website.

    3. Mitigation Recommendations
    The primary mitigation for this vulnerability is to update the S-DEV SEO plugin to version 1.89 or later. This should be done as soon as possible to minimize the window of opportunity for attackers. WordPress users should ensure automatic updates are enabled for plugins when feasible. In the short term, if immediate patching is not possible, input validation and output encoding can be implemented to sanitize user-supplied data before it's rendered on the page. This can provide a secondary layer of defense. Regularly review plugin dependencies and ensure they are kept up-to-date. Further information and the patch can be found on the Patchstack website: https://patchstack.com/database/wordpress/plugin/s-dev-seo/vulnerability/wordpress-s-dev-seo-plugin-1-88-cross-site-scripting-xss-vulnerability?_s_id=cve. Administrators should also consider implementing a Web Application Firewall (WAF) to provide additional protection against XSS attacks.

    4. Executive Summary
    The S-DEV SEO WordPress plugin contains a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious scripts into the website. This vulnerability, CVE-2025-22744, is rated as medium severity and could result in website defacement, user session compromise, or redirection to malicious websites. While the risk of exploitation is relatively low based on the EPSS score, the impact could affect user trust and brand reputation. The most important action is to update the S-DEV SEO plugin to version 1.89 or later. This update will neutralize the vulnerability and protect your website and its visitors. Addressing this vulnerability promptly is crucial for maintaining the security and integrity of your WordPress site. Regular plugin updates are a best practice to minimize the risk of future vulnerabilities.