Skip to main content

CVE-2025-3862: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons

Medium
VulnerabilityCVE-2025-3862cvecve-2025-3862cwe-79
Published: Thu May 08 2025 (05/08/2025, 11:13:44 UTC)
Source: CVE
Vendor/Project: contest-gallery
Product: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons

Description

Contest Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 26.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/05/2025, 07:09:51 UTC

Technical Analysis

CVE-2025-3862 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Contest Gallery plugin for WordPress, which is used to manage photos, files, and social media content (YouTube, Twitter, Instagram, TikTok) and supports ecommerce features like uploading, voting, selling via PayPal or Stripe, and social share buttons. The vulnerability arises from improper neutralization of input during web page generation, specifically via the 'id' parameter. This parameter is insufficiently sanitized and escaped, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the context of the affected website. The vulnerability affects all versions up to and including 26.0.6. The CVSS v3.1 score is 6.4 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (Contributor or higher), no user interaction, and a scope change. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are currently in the wild, and no official patches have been linked yet. This vulnerability is significant because WordPress is widely used across Europe, and plugins like Contest Gallery are popular for interactive content and ecommerce, making this a vector for targeted attacks against website users and administrators.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites using the Contest Gallery plugin, especially those relying on user-generated content and ecommerce features. Exploitation could lead to theft of user credentials, session tokens, or other sensitive information, enabling attackers to impersonate users or administrators. This can result in unauthorized transactions, defacement, or further compromise of the website infrastructure. Given the scope change indicated in the CVSS vector, the vulnerability could allow attackers to affect users beyond their initial privileges, potentially escalating their control within the site. Organizations handling personal data under GDPR must consider the confidentiality breach implications, which could lead to regulatory penalties and reputational damage. The lack of user interaction requirement means attacks can be automated and widespread once exploited. Although no known exploits exist yet, the medium severity and ease of exploitation by authenticated contributors make this a credible threat, especially for organizations with multiple content contributors or less stringent access controls.

Mitigation Recommendations

1. Immediately review and restrict Contributor-level access to trusted users only, minimizing the number of accounts that can exploit this vulnerability. 2. Implement strict input validation and output encoding on the 'id' parameter and any other user-supplied inputs within the plugin, ideally by applying a Web Application Firewall (WAF) rule targeting Contest Gallery plugin requests to detect and block suspicious payloads. 3. Monitor web server and application logs for unusual script injection patterns or unexpected parameter values related to the 'id' parameter. 4. Until an official patch is released, consider disabling or removing the Contest Gallery plugin if feasible, especially on high-risk or critical websites. 5. Educate content contributors about the risks of injecting untrusted content and enforce content submission policies. 6. Regularly update WordPress core and plugins to the latest versions once a patch addressing this vulnerability is available. 7. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts, mitigating the impact of stored XSS. 8. Conduct security audits and penetration testing focusing on user input handling in the plugin to identify any additional weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-21T18:09:27.987Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8634

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 7:09:51 AM

Last updated: 8/18/2025, 11:32:27 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats