Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15396: CWE-79 Cross-Site Scripting (XSS) in Library Viewer

0
High
VulnerabilityCVE-2025-15396cvecve-2025-15396cwe-79
Published: Mon Feb 02 2026 (02/02/2026, 06:00:02 UTC)
Source: CVE Database V5
Product: Library Viewer

Description

CVE-2025-15396 is a high-severity reflected Cross-Site Scripting (XSS) vulnerability in the Library Viewer WordPress plugin versions before 3. 2. 0. The vulnerability arises because the plugin fails to properly sanitize and escape certain parameters before reflecting them in the page output. This flaw allows attackers to craft malicious URLs that, when visited by high-privilege users such as administrators, can execute arbitrary scripts in their browsers. Exploitation requires user interaction but no prior authentication, and it can impact confidentiality, integrity, and availability by stealing session tokens, performing actions on behalf of admins, or defacing content. Although no known exploits are currently reported in the wild, the vulnerability’s CVSS score of 7. 1 indicates a significant risk. European organizations using the Library Viewer plugin on WordPress sites, especially those with administrative users accessing the plugin, should prioritize patching or mitigating this issue. Countries with high WordPress adoption and significant digital infrastructure, such as Germany, the UK, France, and the Netherlands, are more likely to be affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/09/2026, 11:01:42 UTC

Technical Analysis

CVE-2025-15396 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Library Viewer WordPress plugin prior to version 3.2.0. The root cause is the plugin's failure to properly sanitize and escape certain input parameters before reflecting them back in the HTML output. This allows an attacker to craft malicious URLs containing JavaScript payloads that execute in the context of the victim’s browser when the URL is accessed. Since the vulnerability is reflected, it requires the victim—typically a high-privilege user such as an administrator—to click on or visit a maliciously crafted link. The CVSS 3.1 base score of 7.1 reflects a high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality, integrity, and availability (C:L/I:L/A:L). The scope change means the vulnerability can affect resources beyond the initially vulnerable component, potentially compromising the entire WordPress site or administrative session. Exploitation could lead to session hijacking, unauthorized actions performed with admin privileges, or defacement of the website. Although no known exploits are currently reported in the wild, the vulnerability is publicly disclosed and thus may attract attackers. The Library Viewer plugin is used to display digital library content on WordPress sites, often in educational, governmental, or cultural institutions, which may hold sensitive or critical information. The vulnerability was reserved at the end of 2025 and published in early 2026, indicating recent discovery and disclosure. No official patches or updates are linked yet, so organizations must monitor for updates or apply temporary mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-15396 can be significant, especially for those relying on the Library Viewer plugin to present digital content on WordPress platforms. Successful exploitation can compromise administrative accounts, leading to unauthorized access to sensitive data, modification or deletion of content, and potential disruption of services. This can damage organizational reputation, lead to data breaches, and violate data protection regulations such as GDPR. Educational institutions, government agencies, and cultural organizations in Europe that use this plugin are particularly at risk due to the sensitive nature of their data and the high privileges of affected users. The reflected XSS nature means attackers can exploit this vulnerability remotely without authentication but require tricking users into clicking malicious links, which is feasible through phishing campaigns. The scope change in the CVSS vector suggests that the vulnerability can impact components beyond the plugin itself, potentially affecting the entire WordPress site’s integrity and availability. Given the widespread use of WordPress across Europe, the threat surface is broad, and the potential for lateral movement or further compromise exists if attackers leverage this vulnerability as an initial foothold.

Mitigation Recommendations

1. Update the Library Viewer plugin to version 3.2.0 or later as soon as it becomes available, as this will include proper input sanitization and escaping to prevent XSS. 2. Until an official patch is released, implement a Web Application Firewall (WAF) with rules specifically designed to detect and block reflected XSS payloads targeting the plugin’s parameters. 3. Restrict administrative access to the WordPress backend and the plugin interface by IP whitelisting or VPN access to reduce exposure to malicious links. 4. Educate administrators and high-privilege users about the risks of clicking on unsolicited or suspicious links, particularly those that may contain URL parameters. 5. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers, mitigating the impact of potential XSS payloads. 6. Regularly audit and monitor web server logs and WordPress activity logs for unusual access patterns or attempts to exploit XSS vectors. 7. Consider disabling or limiting the use of the Library Viewer plugin if it is not essential, reducing the attack surface. 8. Engage in proactive vulnerability scanning and penetration testing focused on web application security to identify similar issues early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-31T14:37:36.348Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698043e3ac06320222c1dd0b

Added to database: 2/2/2026, 6:27:47 AM

Last enriched: 2/9/2026, 11:01:42 AM

Last updated: 3/25/2026, 2:09:02 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses