CVE-2025-2484: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in skustes Multi Video Box
CVE-2025-2484 is a reflected Cross-Site Scripting (XSS) vulnerability in the Multi Video Box WordPress plugin by skustes, affecting all versions up to 1. 5. 2. It arises from improper input sanitization and output escaping of the 'video_id' and 'group_id' parameters. An unauthenticated attacker can craft malicious URLs that, when clicked by a user, execute arbitrary scripts in the victim's browser. This vulnerability requires user interaction but no authentication, and it impacts confidentiality and integrity with no direct effect on availability. The CVSS score is 6. 1 (medium severity), reflecting the ease of exploitation and potential for session hijacking or phishing. No known exploits are currently in the wild, and no official patches have been released. Organizations using this plugin should prioritize input validation, output encoding, and consider disabling or replacing the plugin until a fix is available.
AI Analysis
Technical Summary
The Multi Video Box plugin for WordPress, developed by skustes, suffers from a reflected Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-2484. This vulnerability stems from improper neutralization of input during web page generation, specifically involving the 'video_id' and 'group_id' URL parameters. Versions up to and including 1.5.2 fail to adequately sanitize and escape these inputs, allowing attackers to inject arbitrary JavaScript code. Because the vulnerability is reflected, the malicious script is embedded in a crafted URL that, when visited by a user, executes in their browser context. The attack requires no authentication but does require user interaction, such as clicking a malicious link. The vulnerability impacts the confidentiality and integrity of user data by enabling session hijacking, credential theft, or phishing attacks. The CVSS 3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network, low attack complexity, no privileges required, user interaction needed, and scope changed due to potential impact beyond the vulnerable component. No patches or official fixes have been published yet, and no known exploits are reported in the wild. The vulnerability is classified under CWE-79, which is a common and well-understood web application security flaw. Given the widespread use of WordPress and the popularity of video-related plugins, this vulnerability poses a significant risk to websites using Multi Video Box, especially those with high user traffic or sensitive user data.
Potential Impact
The primary impact of CVE-2025-2484 is on the confidentiality and integrity of users interacting with vulnerable websites. Attackers can steal session cookies, perform actions on behalf of users, or redirect users to malicious sites, facilitating phishing or malware distribution. Although availability is not directly affected, the reputational damage and potential data breaches can have severe consequences for organizations. This vulnerability can be exploited remotely without authentication, increasing its risk profile. Organizations relying on the Multi Video Box plugin for video content delivery may face increased risk of account compromise, data leakage, and loss of user trust. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the affected network. The lack of a patch and known exploits in the wild suggests a window of exposure that organizations must address proactively. The scope of affected systems is broad, as all plugin versions up to 1.5.2 are vulnerable, and WordPress powers millions of websites globally.
Mitigation Recommendations
To mitigate CVE-2025-2484, organizations should immediately audit their WordPress installations to identify the presence of the Multi Video Box plugin and its version. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate exposure. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'video_id' and 'group_id' parameters. Employ Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of injected scripts. Educate users and administrators about the risks of clicking untrusted links, especially those containing suspicious URL parameters. Developers maintaining the plugin should apply proper input validation and output encoding techniques, such as using WordPress’s built-in escaping functions (e.g., esc_attr(), esc_html()) on all user-controllable inputs. Regularly monitor web server logs and security alerts for signs of exploitation attempts. Finally, maintain an incident response plan to quickly address any detected compromise related to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Netherlands, Japan
CVE-2025-2484: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in skustes Multi Video Box
Description
CVE-2025-2484 is a reflected Cross-Site Scripting (XSS) vulnerability in the Multi Video Box WordPress plugin by skustes, affecting all versions up to 1. 5. 2. It arises from improper input sanitization and output escaping of the 'video_id' and 'group_id' parameters. An unauthenticated attacker can craft malicious URLs that, when clicked by a user, execute arbitrary scripts in the victim's browser. This vulnerability requires user interaction but no authentication, and it impacts confidentiality and integrity with no direct effect on availability. The CVSS score is 6. 1 (medium severity), reflecting the ease of exploitation and potential for session hijacking or phishing. No known exploits are currently in the wild, and no official patches have been released. Organizations using this plugin should prioritize input validation, output encoding, and consider disabling or replacing the plugin until a fix is available.
AI-Powered Analysis
Technical Analysis
The Multi Video Box plugin for WordPress, developed by skustes, suffers from a reflected Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-2484. This vulnerability stems from improper neutralization of input during web page generation, specifically involving the 'video_id' and 'group_id' URL parameters. Versions up to and including 1.5.2 fail to adequately sanitize and escape these inputs, allowing attackers to inject arbitrary JavaScript code. Because the vulnerability is reflected, the malicious script is embedded in a crafted URL that, when visited by a user, executes in their browser context. The attack requires no authentication but does require user interaction, such as clicking a malicious link. The vulnerability impacts the confidentiality and integrity of user data by enabling session hijacking, credential theft, or phishing attacks. The CVSS 3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network, low attack complexity, no privileges required, user interaction needed, and scope changed due to potential impact beyond the vulnerable component. No patches or official fixes have been published yet, and no known exploits are reported in the wild. The vulnerability is classified under CWE-79, which is a common and well-understood web application security flaw. Given the widespread use of WordPress and the popularity of video-related plugins, this vulnerability poses a significant risk to websites using Multi Video Box, especially those with high user traffic or sensitive user data.
Potential Impact
The primary impact of CVE-2025-2484 is on the confidentiality and integrity of users interacting with vulnerable websites. Attackers can steal session cookies, perform actions on behalf of users, or redirect users to malicious sites, facilitating phishing or malware distribution. Although availability is not directly affected, the reputational damage and potential data breaches can have severe consequences for organizations. This vulnerability can be exploited remotely without authentication, increasing its risk profile. Organizations relying on the Multi Video Box plugin for video content delivery may face increased risk of account compromise, data leakage, and loss of user trust. Additionally, attackers could leverage this vulnerability as a foothold for further attacks within the affected network. The lack of a patch and known exploits in the wild suggests a window of exposure that organizations must address proactively. The scope of affected systems is broad, as all plugin versions up to 1.5.2 are vulnerable, and WordPress powers millions of websites globally.
Mitigation Recommendations
To mitigate CVE-2025-2484, organizations should immediately audit their WordPress installations to identify the presence of the Multi Video Box plugin and its version. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate exposure. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the 'video_id' and 'group_id' parameters. Employ Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of injected scripts. Educate users and administrators about the risks of clicking untrusted links, especially those containing suspicious URL parameters. Developers maintaining the plugin should apply proper input validation and output encoding techniques, such as using WordPress’s built-in escaping functions (e.g., esc_attr(), esc_html()) on all user-controllable inputs. Regularly monitor web server logs and security alerts for signs of exploitation attempts. Finally, maintain an incident response plan to quickly address any detected compromise related to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-17T23:34:28.561Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b23b7ef31ef0b54e81c
Added to database: 2/25/2026, 9:35:31 PM
Last enriched: 2/25/2026, 10:22:53 PM
Last updated: 2/26/2026, 7:23:36 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.