CVE-2025-24565 Overview
CVE-2025-24565 is a reflected Cross-Site Scripting (XSS) vulnerability affecting the Saleswonder Team WP2LEADS plugin for WordPress. The flaw stems from improper neutralization of user-supplied input during web page generation, classified under [CWE-79]. All plugin versions up to and including 3.3.3 are affected. An unauthenticated attacker can craft a malicious URL that, when clicked by a victim, executes arbitrary JavaScript in the victim's browser session within the context of the vulnerable WordPress site.
Critical Impact
Successful exploitation enables session hijacking, credential theft, and unauthorized actions performed on behalf of authenticated WordPress administrators.
Affected Products
- Saleswonder Team WP2LEADS plugin for WordPress
- All versions from n/a through <= 3.3.3
- WordPress sites with the WP2LEADS plugin installed and active
Discovery Timeline
- 2025-02-14 - CVE CVE-2025-24565 published to NVD
- 2026-04-23 - Last updated in NVD database
Technical Details for CVE-2025-24565
Vulnerability Analysis
The WP2LEADS plugin fails to properly sanitize and encode user-controlled input before reflecting it into HTTP response output. When a parameter value is echoed back into the rendered HTML without contextual output encoding, an attacker can inject arbitrary HTML and JavaScript. The injected payload executes in the victim's browser within the trust boundary of the affected WordPress site.
Because the attack vector is network-based and requires only user interaction (such as clicking a crafted link), exploitation is straightforward. The scope is changed, meaning the vulnerable component can affect resources beyond its security scope—typical of XSS reflected into the broader WordPress administrative context.
Root Cause
The root cause is missing or insufficient input sanitization combined with the absence of contextual output encoding in one or more request handlers within WP2LEADS up to version 3.3.3. User-supplied parameters reach the HTML response stream without being passed through WordPress sanitization functions such as esc_html(), esc_attr(), or wp_kses().
Attack Vector
An attacker crafts a URL containing a malicious payload in a vulnerable query parameter and delivers it through phishing, social media, or a malicious site. When a logged-in WordPress user opens the link, the payload executes in their browser. Consequences include theft of session cookies, forced administrative actions via forged requests, and redirection to attacker-controlled infrastructure. EPSS data indicates a current exploitation probability of 0.131%.
Refer to the Patchstack WordPress Vulnerability Advisory for additional technical details.
Detection Methods for CVE-2025-24565
Indicators of Compromise
- Inbound HTTP requests to WP2LEADS plugin endpoints containing encoded <script>, onerror=, or javascript: strings in query parameters.
- Web server access logs showing unusual referrers paired with WP2LEADS URL paths and reflected payloads in the response body.
- Browser console errors or unexpected outbound requests originating from WordPress admin sessions.
Detection Strategies
- Deploy a Web Application Firewall (WAF) rule set that flags reflected XSS patterns targeting /wp-content/plugins/wp2leads/ paths.
- Inspect WordPress access logs for query strings containing HTML tags, event handlers, or URL-encoded script delimiters.
- Correlate user-clicked external referrers with subsequent administrative actions to identify potential session abuse.
Monitoring Recommendations
- Enable WordPress audit logging to track administrative changes following suspicious link click activity.
- Monitor for newly created admin users, modified plugin files, or unexpected option changes in wp_options.
- Alert on outbound traffic from administrator browsers to unfamiliar domains immediately following WP2LEADS request activity.
How to Mitigate CVE-2025-24565
Immediate Actions Required
- Identify all WordPress installations running WP2LEADS version 3.3.3 or earlier and prioritize remediation.
- Apply the vendor-released patch as soon as it is available from Saleswonder Team or Patchstack.
- Restrict administrator browsing habits and educate privileged users about clicking untrusted links.
Patch Information
At the time of publication, the vendor has released updates addressing the vulnerability. Site administrators should upgrade WP2LEADS to a version newer than 3.3.3. Consult the Patchstack WordPress Vulnerability Advisory for the fixed version reference.
Workarounds
- Deactivate and remove the WP2LEADS plugin until a patched version is installed.
- Deploy a WAF or virtual patching solution (such as Patchstack or Wordfence) to block reflected XSS payloads targeting the plugin.
- Enforce a strict Content Security Policy (CSP) that disallows inline script execution to reduce the impact of XSS payloads.
# Example WordPress CLI command to deactivate the plugin until patched
wp plugin deactivate wp2leads
wp plugin update wp2leads --version=latest
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


