CVE-2025-26549: Cross-Site Request Forgery (CSRF) in pa1 WP Html Page Sitemap
Cross-Site Request Forgery (CSRF) vulnerability in pa1 WP Html Page Sitemap wp-html-page-sitemap allows Stored XSS.This issue affects WP Html Page Sitemap: from n/a through <= 2.2.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-26549 affects the WP Html Page Sitemap plugin for WordPress, specifically versions up to and including 2.2. It is a Cross-Site Request Forgery (CSRF) vulnerability that enables an attacker to trick an authenticated user into submitting unauthorized requests to the vulnerable plugin. This CSRF flaw facilitates stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are persistently stored on the website and executed in the context of users visiting the affected pages. The root cause lies in insufficient validation of requests and lack of proper anti-CSRF tokens in the plugin's request handling. Exploitation requires the victim to be logged into the WordPress site with sufficient privileges and to visit a crafted malicious webpage that triggers the unauthorized request. Although no exploits have been observed in the wild, the vulnerability poses a significant risk due to the potential for persistent XSS, which can lead to session hijacking, defacement, or distribution of malware. The vulnerability was publicly disclosed on February 13, 2025, but no official patch or CVSS score has been provided by the vendor or security databases. The plugin is commonly used to generate HTML sitemaps for WordPress sites, which means a wide range of websites could be affected if they have not updated or applied mitigations.
Potential Impact
If exploited, this vulnerability could allow attackers to inject persistent malicious scripts into affected WordPress sites, compromising the confidentiality and integrity of user sessions and data. Stored XSS can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or malware distribution. The availability of the site could also be impacted if attackers use the vulnerability to disrupt normal operations. Since exploitation requires an authenticated user, sites with multiple users or administrative roles are at higher risk. The impact extends to site visitors and administrators, potentially damaging organizational reputation and trust. Given the widespread use of WordPress and the plugin's role in sitemap generation, many organizations globally could be affected, especially those that have not updated or mitigated this vulnerability.
Mitigation Recommendations
Organizations should immediately verify if they are using the WP Html Page Sitemap plugin version 2.2 or earlier and plan to update to a patched version as soon as it becomes available. In the absence of an official patch, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block CSRF attempts targeting the plugin's endpoints can provide temporary protection. Enforce strict user authentication and limit administrative privileges to reduce the risk of exploitation. Additionally, site owners should ensure that WordPress core and all plugins are kept up to date, and consider enabling Content Security Policy (CSP) headers to mitigate the impact of potential XSS attacks. Monitoring logs for unusual requests and user activities related to sitemap generation can help detect attempted exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2025-26549: Cross-Site Request Forgery (CSRF) in pa1 WP Html Page Sitemap
Description
Cross-Site Request Forgery (CSRF) vulnerability in pa1 WP Html Page Sitemap wp-html-page-sitemap allows Stored XSS.This issue affects WP Html Page Sitemap: from n/a through <= 2.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-26549 affects the WP Html Page Sitemap plugin for WordPress, specifically versions up to and including 2.2. It is a Cross-Site Request Forgery (CSRF) vulnerability that enables an attacker to trick an authenticated user into submitting unauthorized requests to the vulnerable plugin. This CSRF flaw facilitates stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are persistently stored on the website and executed in the context of users visiting the affected pages. The root cause lies in insufficient validation of requests and lack of proper anti-CSRF tokens in the plugin's request handling. Exploitation requires the victim to be logged into the WordPress site with sufficient privileges and to visit a crafted malicious webpage that triggers the unauthorized request. Although no exploits have been observed in the wild, the vulnerability poses a significant risk due to the potential for persistent XSS, which can lead to session hijacking, defacement, or distribution of malware. The vulnerability was publicly disclosed on February 13, 2025, but no official patch or CVSS score has been provided by the vendor or security databases. The plugin is commonly used to generate HTML sitemaps for WordPress sites, which means a wide range of websites could be affected if they have not updated or applied mitigations.
Potential Impact
If exploited, this vulnerability could allow attackers to inject persistent malicious scripts into affected WordPress sites, compromising the confidentiality and integrity of user sessions and data. Stored XSS can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or malware distribution. The availability of the site could also be impacted if attackers use the vulnerability to disrupt normal operations. Since exploitation requires an authenticated user, sites with multiple users or administrative roles are at higher risk. The impact extends to site visitors and administrators, potentially damaging organizational reputation and trust. Given the widespread use of WordPress and the plugin's role in sitemap generation, many organizations globally could be affected, especially those that have not updated or mitigated this vulnerability.
Mitigation Recommendations
Organizations should immediately verify if they are using the WP Html Page Sitemap plugin version 2.2 or earlier and plan to update to a patched version as soon as it becomes available. In the absence of an official patch, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block CSRF attempts targeting the plugin's endpoints can provide temporary protection. Enforce strict user authentication and limit administrative privileges to reduce the risk of exploitation. Additionally, site owners should ensure that WordPress core and all plugins are kept up to date, and consider enabling Content Security Policy (CSP) headers to mitigate the impact of potential XSS attacks. Monitoring logs for unusual requests and user activities related to sitemap generation can help detect attempted exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-02-12T13:58:25.801Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69cd72a3e6bfc5ba1deec6c8
Added to database: 4/1/2026, 7:31:47 PM
Last enriched: 4/1/2026, 10:10:53 PM
Last updated: 4/6/2026, 11:00:02 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.