Description
The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'video_id' and 'group_id' parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-03-22
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Multi Video Box plugin for WordPress contains a reflected XSS flaw in the "video_id" and "group_id" parameters. The vulnerability arises from insufficient input sanitization and output escaping, allowing an attacker to inject arbitrary JavaScript that runs in the browser of any user who follows a crafted link. This can lead to session hijacking, credential theft, or defacement of the site. The weakness is classified as CWE‑79, a common injection issue where malicious code can be reflected back to the user without proper filtering.

Affected Systems

The flaw affects the skustes Multi Video Box plugin in all releases up to and including version 1.5.2. Users running these or earlier releases are exposed to the risk.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate impact, and the EPSS score of less than 1% suggests that exploitation is currently unlikely but possible. The attack requires an unauthenticated user to click a malicious link, which is a typical user‑interaction scenario for reflected XSS. The vulnerability is not listed in CISA’s KEV catalog, and no official patch or workaround is currently provided by the vendor.

Generated by OpenCVE AI on April 21, 2026 at 21:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Multi Video Box plugin to the latest version where the XSS vectors in video_id and group_id have been fixed.
  • If an update is not immediately possible, implement server‑side input validation and output escaping for the affected parameters to prevent script injection.
  • Deploy a web application firewall that blocks suspicious JavaScript payloads in request parameters and randomizes output context to mitigate reflected XSS.

Generated by OpenCVE AI on April 21, 2026 at 21:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7182 The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'video_id' and 'group_id' parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Tue, 01 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 06:45:00 +0000

Type Values Removed Values Added
Description The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'video_id' and 'group_id' parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Multi Video Box <= 1.5.2 - Reflected Cross-Site Scripting via video_id and group_id Parameters
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:06.017Z

Reserved: 2025-03-17T23:34:28.561Z

Link: CVE-2025-2484

cve-icon Vulnrichment

Updated: 2025-04-01T16:26:35.283Z

cve-icon NVD

Status : Deferred

Published: 2025-03-22T07:15:25.470

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2484

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses