Skip to main content

CVE-2025-48170: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LambertGroup Universal Video Player - Addon for WPBakery Page Builder

High
VulnerabilityCVE-2025-48170cvecve-2025-48170cwe-79
Published: Wed Aug 20 2025 (08/20/2025, 08:03:26 UTC)
Source: CVE Database V5
Vendor/Project: LambertGroup
Product: Universal Video Player - Addon for WPBakery Page Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Universal Video Player - Addon for WPBakery Page Builder allows Reflected XSS. This issue affects Universal Video Player - Addon for WPBakery Page Builder: from n/a through 3.2.1.

AI-Powered Analysis

AILast updated: 08/20/2025, 09:34:13 UTC

Technical Analysis

CVE-2025-48170 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the LambertGroup Universal Video Player - Addon for WPBakery Page Builder, affecting versions up to 3.2.1. This vulnerability arises from improper neutralization of user input during web page generation, classified under CWE-79. Specifically, the addon fails to adequately sanitize or encode input parameters that are reflected back in the web page content, allowing an attacker to inject malicious scripts. When a victim accesses a crafted URL containing the malicious payload, the script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score of 7.1 reflects the vulnerability's characteristics: it is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). The scope is changed (S:C), indicating that exploitation affects components beyond the vulnerable addon itself, potentially impacting the entire web application. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation efforts are still pending or in development. Given the widespread use of WPBakery Page Builder in WordPress sites and the popularity of video player addons, this vulnerability poses a significant risk to websites using this specific addon, especially those that allow user input to be reflected in URLs or web pages without proper sanitization.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for businesses relying on WordPress-based websites that utilize the Universal Video Player addon. Exploitation could lead to unauthorized access to user sessions, theft of sensitive information such as login credentials or personal data, and potential defacement or manipulation of website content. This can damage brand reputation, lead to regulatory non-compliance under GDPR due to data breaches, and cause operational disruptions if attackers leverage the vulnerability to inject malware or redirect users to malicious sites. E-commerce platforms, media companies, educational institutions, and government websites using this addon are at heightened risk. The reflected XSS nature means phishing campaigns could be enhanced by embedding malicious scripts in URLs, increasing the likelihood of successful social engineering attacks targeting European users. Additionally, the scope change indicates that the vulnerability could affect other components or plugins integrated with the affected site, amplifying the potential damage.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their WordPress installations to identify the presence of the LambertGroup Universal Video Player addon and confirm the version in use. 2) Restrict or sanitize all user inputs that are reflected in URLs or page content, employing robust input validation and output encoding techniques consistent with OWASP guidelines. 3) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4) Monitor web server and application logs for suspicious requests containing unusual or encoded script payloads. 5) Educate website administrators and developers about secure coding practices to prevent similar vulnerabilities. 6) Until an official patch is released, consider disabling or removing the vulnerable addon to eliminate exposure. 7) Employ Web Application Firewalls (WAFs) with rules designed to detect and block reflected XSS attack patterns targeting this specific addon. 8) Regularly update all WordPress plugins and themes to their latest versions once patches become available. These steps go beyond generic advice by focusing on immediate detection, containment, and proactive defense tailored to the specific vulnerability and its exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:02:16.098Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a584b4ad5a09ad0002e2d2

Added to database: 8/20/2025, 8:17:56 AM

Last enriched: 8/20/2025, 9:34:13 AM

Last updated: 8/27/2025, 12:34:26 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats