Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26549: Cross-Site Request Forgery (CSRF) in pa1 WP Html Page Sitemap

0
Unknown
VulnerabilityCVE-2025-26549cvecve-2025-26549
Published: Thu Feb 13 2025 (02/13/2025, 13:52:50 UTC)
Source: CVE Database V5
Vendor/Project: pa1
Product: WP Html Page Sitemap

Description

Cross-Site Request Forgery (CSRF) vulnerability in pa1 WP Html Page Sitemap wp-html-page-sitemap allows Stored XSS.This issue affects WP Html Page Sitemap: from n/a through <= 2.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 22:10:53 UTC

Technical Analysis

The vulnerability identified as CVE-2025-26549 affects the WP Html Page Sitemap plugin for WordPress, specifically versions up to and including 2.2. It is a Cross-Site Request Forgery (CSRF) vulnerability that enables an attacker to trick an authenticated user into submitting unauthorized requests to the vulnerable plugin. This CSRF flaw facilitates stored Cross-Site Scripting (XSS), where malicious scripts injected by the attacker are persistently stored on the website and executed in the context of users visiting the affected pages. The root cause lies in insufficient validation of requests and lack of proper anti-CSRF tokens in the plugin's request handling. Exploitation requires the victim to be logged into the WordPress site with sufficient privileges and to visit a crafted malicious webpage that triggers the unauthorized request. Although no exploits have been observed in the wild, the vulnerability poses a significant risk due to the potential for persistent XSS, which can lead to session hijacking, defacement, or distribution of malware. The vulnerability was publicly disclosed on February 13, 2025, but no official patch or CVSS score has been provided by the vendor or security databases. The plugin is commonly used to generate HTML sitemaps for WordPress sites, which means a wide range of websites could be affected if they have not updated or applied mitigations.

Potential Impact

If exploited, this vulnerability could allow attackers to inject persistent malicious scripts into affected WordPress sites, compromising the confidentiality and integrity of user sessions and data. Stored XSS can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or malware distribution. The availability of the site could also be impacted if attackers use the vulnerability to disrupt normal operations. Since exploitation requires an authenticated user, sites with multiple users or administrative roles are at higher risk. The impact extends to site visitors and administrators, potentially damaging organizational reputation and trust. Given the widespread use of WordPress and the plugin's role in sitemap generation, many organizations globally could be affected, especially those that have not updated or mitigated this vulnerability.

Mitigation Recommendations

Organizations should immediately verify if they are using the WP Html Page Sitemap plugin version 2.2 or earlier and plan to update to a patched version as soon as it becomes available. In the absence of an official patch, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implementing Web Application Firewall (WAF) rules to detect and block CSRF attempts targeting the plugin's endpoints can provide temporary protection. Enforce strict user authentication and limit administrative privileges to reduce the risk of exploitation. Additionally, site owners should ensure that WordPress core and all plugins are kept up to date, and consider enabling Content Security Policy (CSP) headers to mitigate the impact of potential XSS attacks. Monitoring logs for unusual requests and user activities related to sitemap generation can help detect attempted exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-12T13:58:25.801Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd72a3e6bfc5ba1deec6c8

Added to database: 4/1/2026, 7:31:47 PM

Last enriched: 4/1/2026, 10:10:53 PM

Last updated: 4/6/2026, 11:00:02 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses