CVE-2025-48351

PluginsPoint · PluginsPoint Kento Splash Screen

**A high-severity Cross-Site Request Forgery (CSRF) vulnerability in PluginsPoint Kento Splash Screen allows for Stored XSS, potentially enabling an attacker to compromise user sessions.**.

Executive summary

A high-severity Cross-Site Request Forgery (CSRF) vulnerability in PluginsPoint Kento Splash Screen allows for Stored XSS, potentially enabling an attacker to compromise user sessions.

Vulnerability

The plugin is vulnerable to Cross-Site Request Forgery (CSRF). An unauthenticated attacker can trick an authenticated administrator into executing a crafted request that injects a persistent malicious script (Stored XSS) into the splash screen configuration, which is then served to site visitors.

Business impact

Rated as High severity with a CVSS score of 7.1, this vulnerability poses a significant risk. An attacker can use this flaw to execute arbitrary JavaScript in the browsers of every user who sees the splash screen. This could be used to steal session cookies, capture credentials, or redirect users to malicious websites before they even reach the main site content.

Remediation

Immediate Action: Update the PluginsPoint Kento Splash Screen plugin to the latest patched version from the vendor to eliminate the vulnerability.

Proactive Monitoring: Scan the website's splash screen configuration and related database entries for any unexpected behavior or injected scripts.

Compensating Controls: Implement a Web Application Firewall (WAF) to block CSRF attempts and filter requests containing XSS payloads, providing a crucial layer of defense.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability to inject persistent malicious code into a site-wide element like a splash screen is a critical security issue. Given the High severity rating, immediate action is required. Administrators must update the plugin without delay to protect the website and its users.