Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32478: Cross-Site Request Forgery (CSRF) in Mario Aguiar WP SexyLightBox

0
Unknown
VulnerabilityCVE-2025-32478cvecve-2025-32478
Published: Wed Apr 09 2025 (04/09/2025, 16:09:55 UTC)
Source: CVE Database V5
Vendor/Project: Mario Aguiar
Product: WP SexyLightBox

Description

Cross-Site Request Forgery (CSRF) vulnerability in Mario Aguiar WP SexyLightBox wp-sexylightbox allows Stored XSS.This issue affects WP SexyLightBox: from n/a through <= 0.5.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 03:07:00 UTC

Technical Analysis

CVE-2025-32478 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WP SexyLightBox plugin for WordPress, specifically affecting versions up to 0.5.3. CSRF vulnerabilities allow attackers to trick authenticated users into executing unwanted actions on a web application without their consent. In this case, the CSRF flaw enables an attacker to inject Stored Cross-Site Scripting (XSS) payloads into the plugin's functionality. Stored XSS occurs when malicious scripts are permanently stored on the target server, such as in a database or content repository, and then served to users, enabling attackers to execute arbitrary JavaScript in victims' browsers. This combination of CSRF and Stored XSS is particularly dangerous because it can bypass typical user interaction requirements and persistently affect multiple users. The vulnerability arises due to insufficient verification of request authenticity and inadequate input sanitization within the plugin. Although no public exploits have been reported yet, the vulnerability is publicly disclosed and could be weaponized by attackers targeting WordPress sites using this plugin. WP SexyLightBox is used to enhance image display on WordPress sites, and its user base, while niche, includes websites that may be targeted for defacement, data theft, or session hijacking. The lack of a CVSS score indicates that the vulnerability is newly published, but the technical details suggest a significant risk due to the combination of CSRF and stored XSS vectors. The vulnerability was reserved and published in April 2025 by Patchstack, a known security researcher group focusing on WordPress plugins.

Potential Impact

The impact of CVE-2025-32478 on organizations worldwide can be substantial, especially for those relying on the WP SexyLightBox plugin for their WordPress sites. Successful exploitation allows attackers to perform unauthorized actions on behalf of authenticated users, potentially leading to privilege escalation, unauthorized content modification, or administrative control takeover. The stored XSS component can be used to steal session cookies, deface websites, redirect users to malicious sites, or deliver malware payloads to site visitors. This can result in reputational damage, data breaches, loss of customer trust, and regulatory compliance issues. Since WordPress powers a significant portion of the web, any vulnerability in popular plugins can have widespread consequences. Organizations with public-facing WordPress sites that use this plugin are at risk of targeted attacks, especially if they do not have additional security controls such as Web Application Firewalls (WAFs) or strict Content Security Policies (CSP). The absence of known exploits currently limits immediate impact, but the public disclosure increases the likelihood of future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-32478, organizations should take the following specific actions: 1) Immediately update the WP SexyLightBox plugin to a patched version once available from the vendor or developer. If no patch is available, consider disabling or uninstalling the plugin until a fix is released. 2) Implement strict CSRF protections by ensuring that all state-changing requests require a valid, unique anti-CSRF token verified on the server side. 3) Sanitize and validate all user inputs rigorously to prevent injection of malicious scripts, especially in areas where user content is stored and rendered. 4) Deploy a Web Application Firewall (WAF) with rules to detect and block common CSRF and XSS attack patterns targeting WordPress plugins. 5) Enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 6) Monitor web server and application logs for suspicious activities indicative of exploitation attempts. 7) Educate site administrators about the risks of CSRF and XSS and encourage the use of strong authentication and session management practices. 8) Regularly audit installed plugins for vulnerabilities and remove unused or outdated plugins to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-09T11:18:53.986Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd73c0e6bfc5ba1def37e2

Added to database: 4/1/2026, 7:36:32 PM

Last enriched: 4/2/2026, 3:07:00 AM

Last updated: 4/8/2026, 9:07:13 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses