Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15386: CWE-79 Cross-Site Scripting (XSS) in Responsive Lightbox & Gallery

0
High
VulnerabilityCVE-2025-15386cvecve-2025-15386cwe-79
Published: Tue Feb 24 2026 (02/24/2026, 06:00:07 UTC)
Source: CVE Database V5
Product: Responsive Lightbox & Gallery

Description

CVE-2025-15386 is an unauthenticated stored Cross-Site Scripting (XSS) vulnerability in the Responsive Lightbox & Gallery WordPress plugin versions before 2. 6. 1. The flaw arises from improper regex replacement rules that allow attackers to inject malicious scripts via comments when the lightbox feature for comments is enabled and the comment is approved. Exploitation requires no authentication but does require comment approval, enabling persistent script execution in the context of site visitors. This vulnerability can lead to session hijacking, defacement, or distribution of malware. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching or disabling the vulnerable feature to mitigate risk. The threat primarily affects WordPress sites globally, especially those with active comment sections and the plugin installed. Given the ease of exploitation and potential impact on confidentiality and integrity, the severity is assessed as high.

AI-Powered Analysis

AILast updated: 02/24/2026, 06:31:49 UTC

Technical Analysis

CVE-2025-15386 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Responsive Lightbox & Gallery WordPress plugin, specifically in versions prior to 2.6.1, including version 1.7.0. The vulnerability stems from flawed regular expression replacement logic used within the plugin's handling of comments when the lightbox feature for comments is enabled. An attacker can exploit this by submitting a comment containing a maliciously crafted link that bypasses the regex filters. Once the comment is approved by a moderator, the malicious script is persistently stored and executed in the browsers of users who view the comment, enabling an unauthenticated attacker to execute arbitrary JavaScript code in the context of the affected site. This can lead to theft of session cookies, redirection to malicious sites, or other client-side attacks. The vulnerability does not require authentication to submit the malicious comment but does require comment approval, which may limit exploitation to sites with less stringent moderation. No CVSS score has been assigned yet, and no known exploits are reported in the wild. The vulnerability is tracked under CWE-79, indicating a classic XSS issue. The plugin is widely used on WordPress sites that utilize image galleries with lightbox functionality, making the attack surface significant. The flaw highlights the risks of improper input sanitization and the importance of secure regex usage in web applications.

Potential Impact

The impact of CVE-2025-15386 is significant for organizations running WordPress sites with the vulnerable Responsive Lightbox & Gallery plugin and enabled comment lightbox features. Successful exploitation allows attackers to execute arbitrary JavaScript in the browsers of site visitors, potentially leading to session hijacking, theft of sensitive user data, defacement of the website, or distribution of malware. This undermines user trust and can damage brand reputation. For e-commerce, financial, or sensitive information portals, the confidentiality and integrity of user data are at risk. The vulnerability can also be leveraged for phishing attacks by injecting deceptive content. Although exploitation requires comment approval, sites with lax moderation policies are particularly vulnerable. The availability of the site is less likely to be directly affected, but indirect impacts such as blacklisting by search engines or browsers due to malicious content can occur. Overall, the vulnerability poses a high risk to the confidentiality and integrity of affected websites and their users.

Mitigation Recommendations

To mitigate CVE-2025-15386, organizations should immediately upgrade the Responsive Lightbox & Gallery plugin to version 2.6.1 or later, where the vulnerability is patched. If upgrading is not immediately possible, disable the lightbox feature for comments to prevent exploitation. Implement strict comment moderation policies to ensure that no untrusted or suspicious comments are approved. Employ Web Application Firewalls (WAFs) with rules designed to detect and block XSS payloads in comment submissions. Additionally, enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on the site. Regularly audit and sanitize all user-generated content, especially in comment sections. Monitor logs for unusual comment submissions or script injections. Educate site administrators about the risks of approving comments without proper review. Finally, consider deploying security plugins that provide enhanced input validation and XSS protection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-31T07:28:37.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699d4271be58cf853b689cc4

Added to database: 2/24/2026, 6:17:21 AM

Last enriched: 2/24/2026, 6:31:49 AM

Last updated: 2/24/2026, 7:19:34 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats