Description
Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled ThickBox JavaScript library (version 3.1) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-03
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via the ThickBox JavaScript library
Action: Apply Patch
AI Analysis

Impact

A stored cross‑site scripting flaw exists in the ThickBox 3.1 JavaScript library bundled with several WordPress plugins. Insufficient input sanitization and output escaping allow an authenticated user with contributor‑level or higher access to inject arbitrary JavaScript into plugin content. When the affected page is loaded by any visitor, the injected script executes in the visitor’s browser, potentially hijacking sessions, defacing the site, or delivering further malicious payloads. This weakness is categorized as CWE‑79.

Affected Systems

The vulnerability is present in multiple WordPress plugins that bundle ThickBox 3.1, including Auto Thickbox by denis‑de‑bernardy, NextGEN Gallery by smub, and the YouTube Embed, Playlist and Popup suite by wpdevart. All affected plugins use the same bundled library and share the same flaw. No specific version range is publicly listed beyond "various versions," so any installation of these plugins that has not been updated to a patched release is considered vulnerable.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity, while the EPSS value of <1% suggests a very low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Because the exploit requires authenticated WordPress contributor or higher privileges, the initial attack surface is limited to the site’s own administrators, but once an attacker injects code it can affect all visitors who load the compromised page. Organizations should treat this as a moderate‑risk issue that warrants prompt remediation.

Generated by OpenCVE AI on April 22, 2026 at 01:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest available release of each affected plugin (Auto Thickbox, NextGEN Gallery, YouTube Embed, Playlist and Popup) to incorporate the ThickBox XSS fix.
  • If a patch is not immediately available, remove or replace the bundled ThickBox JavaScript library with a patched version or disable any plugin feature that loads it.
  • Restrict contributor‑level and higher user roles to the minimum privileges required for their tasks, ensuring that only trusted users can edit plugin content that could store scripts.
  • Deploy a web application firewall or security plugin that detects and blocks malicious JavaScript payloads targeting the ThickBox library.

Generated by OpenCVE AI on April 22, 2026 at 01:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19861 Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled ThickBox JavaScript library (version 3.1) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 03 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 12:45:00 +0000

Type Values Removed Values Added
Description Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled ThickBox JavaScript library (version 3.1) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Multiple Plugins <= (Various Versions) - Authenticated (Contributor+) Stored DOM-Based Cross-Site Scripting via ThickBox JavaScript Library
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:54:56.412Z

Reserved: 2025-03-19T19:34:21.673Z

Link: CVE-2025-2537

cve-icon Vulnrichment

Updated: 2025-07-03T13:04:07.268Z

cve-icon NVD

Status : Deferred

Published: 2025-07-03T13:15:27.337

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2537

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:15:07Z

Weaknesses