Skip to main content

CVE-2025-3752: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in terrillthompson Able Player, accessible HTML5 media player

Medium
Published: Fri Apr 25 2025 (04/25/2025, 04:23:05 UTC)
Source: CVE
Vendor/Project: terrillthompson
Product: Able Player, accessible HTML5 media player

Description

The Able Player, accessible HTML5 media player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘preload’ parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 06/24/2025, 15:27:18 UTC

Technical Analysis

CVE-2025-3752 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Able Player, an accessible HTML5 media player plugin for WordPress developed by terrillthompson. This vulnerability affects all versions up to and including 1.2.1. The root cause is insufficient input sanitization and output escaping of the 'preload' parameter, which allows an authenticated attacker with Contributor-level access or higher to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. Since the vulnerability requires authentication at Contributor level or above, it is not exploitable by unauthenticated users but can be leveraged by insiders or attackers who have gained limited access. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. No known public exploits have been reported yet, and no patches have been released as of the publication date (April 25, 2025). The vulnerability is medium severity, reflecting moderate impact and exploitation complexity. The plugin is widely used in WordPress environments that require accessible media playback, particularly in organizations emphasizing compliance with accessibility standards.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web applications that use the Able Player plugin. Since the vulnerability allows stored XSS, attackers can execute persistent malicious scripts, potentially compromising user sessions, stealing sensitive data, or performing unauthorized actions within the context of authenticated users. This is particularly concerning for organizations handling personal data under GDPR, as exploitation could lead to data breaches and regulatory penalties. The requirement for Contributor-level access limits the attack surface to insiders or compromised accounts, but given the collaborative nature of many European organizations' websites and content management systems, this risk remains non-trivial. Additionally, the accessibility focus of Able Player means it is often deployed in public sector, educational, and media organizations that prioritize inclusive web content, which are prevalent across Europe. The vulnerability could also be leveraged for defacement or misinformation campaigns, impacting organizational reputation and trust. Availability impact is limited, as the vulnerability does not directly cause denial of service, but indirect effects from exploitation could disrupt normal operations.

Mitigation Recommendations

1. Immediate mitigation should include restricting Contributor-level access strictly to trusted users and auditing existing user permissions to minimize the risk of insider exploitation. 2. Implement web application firewall (WAF) rules to detect and block suspicious payloads targeting the 'preload' parameter in HTTP requests. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 4. Sanitize and validate all user inputs at the application level, especially those related to media player parameters, until an official patch is released. 5. Monitor logs for unusual activity related to the plugin or user accounts with elevated privileges. 6. Plan for prompt patching once the vendor releases an update addressing this vulnerability. 7. Educate content editors and contributors about the risks of injecting untrusted content and encourage reporting of suspicious behavior. 8. Consider temporarily disabling or replacing the Able Player plugin if feasible, especially in high-risk environments or where Contributor access cannot be tightly controlled.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-16T21:29:18.314Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefeef

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 3:27:18 PM

Last updated: 7/30/2025, 6:03:18 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats