Description
Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui JSON Structuring Markup json-structuring-markup allows Stored XSS.This issue affects JSON Structuring Markup: from n/a through <= 0.1.
Published: 2025-04-01
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability lies in the JSON Structuring Markup plugin for WordPress, where a stored cross‑site scripting payload can be implanted through a cross‑site request forgery attack. An attacker can force a logged‑in user to submit a crafted request that stores a malicious script in the plugin’s configuration. When the stored payload is later rendered on the site, the script runs in the context of visitors, potentially stealing credentials, defacing content, or executing further malicious actions. The weakness is classified as a CSRF flaw that results in persistent script injection. The impact is limited to environments that use the affected plugin and have authenticated users whose actions can be tricked into uploading the payload.

Affected Systems

WordPress installations that have the JSON Structuring Markup plugin version 0.1 or earlier, released by Sami Ahmed Siddiqui. Sites running these versions are at risk if the plugin is active and exposed to authenticated users.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity vulnerability, while the EPSS score of less than 1% suggests a low but not nonexistent likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalogue. Exploitation requires a user with sufficient privileges to submit a request to the plugin endpoint, often achieved by a phishing link or a malicious form. Once the stored payload is persisted, any visitor to a page that renders it will execute the injected script.

Generated by OpenCVE AI on May 1, 2026 at 01:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the JSON Structuring Markup plugin to a version greater than 0.1 or remove the plugin entirely
  • If an upgrade is not possible, block access to the plugin’s configuration endpoints using a web application firewall or enclose them behind a higher‑level authentication barrier
  • Apply general CSRF protection measures such as nonce validation on all form submissions and enforce strict same‑origin policies on the site

Generated by OpenCVE AI on May 1, 2026 at 01:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9140 Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui JSON Structuring Markup allows Stored XSS. This issue affects JSON Structuring Markup: from n/a through 0.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui JSON Structuring Markup allows Stored XSS. This issue affects JSON Structuring Markup: from n/a through 0.1. Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui JSON Structuring Markup json-structuring-markup allows Stored XSS.This issue affects JSON Structuring Markup: from n/a through <= 0.1.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 01 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui JSON Structuring Markup allows Stored XSS. This issue affects JSON Structuring Markup: from n/a through 0.1.
Title WordPress JSON Structuring Markup plugin <= 0.1 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:16.149Z

Reserved: 2025-04-01T13:21:40.754Z

Link: CVE-2025-31908

cve-icon Vulnrichment

Updated: 2025-04-01T16:17:34.442Z

cve-icon NVD

Status : Deferred

Published: 2025-04-01T15:16:33.260

Modified: 2026-04-23T15:28:31.797

Link: CVE-2025-31908

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T01:45:05Z

Weaknesses