CVE-2025-28922

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in the WordPress Go To Top plugin allows attackers to trick authenticated administrators into executing malicious actions, leading to stored cross-site scripting (XSS). Attackers can inject malicious scripts that execute in users' browsers when they visit affected pages. All WordPress sites using Go To Top plugin versions up to 0.0.8 are affected.

💻 Affected Systems

Products:
  • WordPress Go To Top plugin
Versions: n/a through 0.0.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the Go To Top plugin enabled and an authenticated admin user to trigger the CSRF.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious scripts that steal session cookies, redirect users to malicious sites, or perform actions as authenticated users, potentially compromising the entire WordPress site.

🟠

Likely Case

Attackers create malicious admin actions that inject JavaScript payloads into site content, affecting visitors who view compromised pages with session hijacking or defacement.

🟢

If Mitigated

With proper CSRF protections and content security policies, the attack surface is reduced, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires tricking an authenticated admin into clicking a malicious link while logged in, then the stored XSS payload persists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 0.0.8

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/go-to-top/vulnerability/wordpress-go-to-top-plugin-0-0-8-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Go To Top' plugin. 4. Click 'Update Now' if update available. 5. If no update, deactivate and delete plugin, then find updated version in repository.

🔧 Temporary Workarounds

Implement CSRF Protection

WordPress

Add nonce verification to plugin admin actions to prevent CSRF attacks.

Requires code modification: Add wp_verify_nonce() checks in plugin PHP files handling admin actions.

🧯 If You Can't Patch

  • Deactivate and remove the Go To Top plugin immediately.
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Go To Top plugin version. If version is 0.0.8 or earlier, you are vulnerable.

Check Version:

wp plugin list --name='go-to-top' --field=version (if WP-CLI installed)

Verify Fix Applied:

After update, verify plugin version is higher than 0.0.8 in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin actions from unexpected IPs
  • Plugin activation/deactivation logs for Go To Top
  • POST requests to wp-admin/admin-ajax.php with suspicious parameters

Network Indicators:

  • HTTP requests with crafted parameters targeting Go To Top plugin endpoints
  • Unexpected JavaScript injection in site content

SIEM Query:

source="wordpress" AND (plugin="go-to-top" OR uri_path="/wp-content/plugins/go-to-top/") AND (http_method="POST" OR action="admin-ajax")

🔗 References

📤 Share & Export