CVE-2025-5092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lightgalleryteam LightGallery WP
Multiple plugins and/or themes for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled lightGallery library (<= 2.8.3) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-5092 is a stored Cross-Site Scripting (XSS) vulnerability categorized under CWE-79, found in the LightGallery WP plugin for WordPress. This plugin bundles the lightGallery JavaScript library (versions up to 2.8.3), which improperly neutralizes user input during web page generation. Specifically, insufficient input sanitization and output escaping on user-supplied attributes allow authenticated users with Contributor-level permissions or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The vulnerability affects all versions of LightGallery WP using the vulnerable library. The attack vector is remote over the network, requiring low attack complexity and only limited privileges (Contributor or above). No user interaction is needed for the payload to execute once injected, and the scope is changed as the vulnerability affects other users viewing the injected content. The CVSS v3.1 base score is 6.4, reflecting a medium severity level due to the impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability's presence in widely used WordPress plugins makes it a significant risk. The lack of official patches at the time of publication necessitates immediate attention from administrators to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites running WordPress with the LightGallery WP plugin or other plugins/themes bundling the vulnerable lightGallery library. Successful exploitation can lead to unauthorized disclosure of sensitive information (e.g., session cookies, personal data), unauthorized actions performed on behalf of users, and potential defacement or redirection attacks. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches due to data leakage), and disrupt business operations relying on web presence. Since the vulnerability requires only Contributor-level access, attackers can leverage compromised or weak user accounts to escalate their impact. The medium severity rating indicates a moderate but tangible threat, especially for organizations with public-facing WordPress sites used for customer engagement, e-commerce, or internal portals. The cross-site scripting nature also increases the risk of phishing and malware distribution campaigns targeting European users.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the LightGallery WP plugin or any plugins/themes bundling the vulnerable lightGallery library (<= 2.8.3). Until official patches are released, organizations should restrict Contributor-level permissions to trusted users only and consider temporarily disabling or removing the affected plugins. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting LightGallery WP can provide interim protection. Additionally, applying Content Security Policy (CSP) headers can mitigate the impact of injected scripts by restricting script execution sources. Regularly monitoring logs for suspicious activity related to user input and reviewing user accounts for unauthorized privilege escalation is critical. Organizations should stay updated on vendor advisories for patches and apply them promptly once available. Finally, educating users about the risks of XSS and enforcing strong authentication controls reduces the likelihood of exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-5092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lightgalleryteam LightGallery WP
Description
Multiple plugins and/or themes for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled lightGallery library (<= 2.8.3) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-5092 is a stored Cross-Site Scripting (XSS) vulnerability categorized under CWE-79, found in the LightGallery WP plugin for WordPress. This plugin bundles the lightGallery JavaScript library (versions up to 2.8.3), which improperly neutralizes user input during web page generation. Specifically, insufficient input sanitization and output escaping on user-supplied attributes allow authenticated users with Contributor-level permissions or higher to inject arbitrary JavaScript code into pages. When other users access these pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The vulnerability affects all versions of LightGallery WP using the vulnerable library. The attack vector is remote over the network, requiring low attack complexity and only limited privileges (Contributor or above). No user interaction is needed for the payload to execute once injected, and the scope is changed as the vulnerability affects other users viewing the injected content. The CVSS v3.1 base score is 6.4, reflecting a medium severity level due to the impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability's presence in widely used WordPress plugins makes it a significant risk. The lack of official patches at the time of publication necessitates immediate attention from administrators to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites running WordPress with the LightGallery WP plugin or other plugins/themes bundling the vulnerable lightGallery library. Successful exploitation can lead to unauthorized disclosure of sensitive information (e.g., session cookies, personal data), unauthorized actions performed on behalf of users, and potential defacement or redirection attacks. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches due to data leakage), and disrupt business operations relying on web presence. Since the vulnerability requires only Contributor-level access, attackers can leverage compromised or weak user accounts to escalate their impact. The medium severity rating indicates a moderate but tangible threat, especially for organizations with public-facing WordPress sites used for customer engagement, e-commerce, or internal portals. The cross-site scripting nature also increases the risk of phishing and malware distribution campaigns targeting European users.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the LightGallery WP plugin or any plugins/themes bundling the vulnerable lightGallery library (<= 2.8.3). Until official patches are released, organizations should restrict Contributor-level permissions to trusted users only and consider temporarily disabling or removing the affected plugins. Implementing a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting LightGallery WP can provide interim protection. Additionally, applying Content Security Policy (CSP) headers can mitigate the impact of injected scripts by restricting script execution sources. Regularly monitoring logs for suspicious activity related to user input and reviewing user accounts for unauthorized privilege escalation is critical. Organizations should stay updated on vendor advisories for patches and apply them promptly once available. Finally, educating users about the risks of XSS and enforcing strong authentication controls reduces the likelihood of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-22T16:48:25.802Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691eb8d39f5a9374a9bdd7d6
Added to database: 11/20/2025, 6:44:35 AM
Last enriched: 11/27/2025, 7:16:09 AM
Last updated: 1/7/2026, 6:10:28 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.