Skip to main content

CVE-2025-53562: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LambertGroup Universal Video Player - Addon for WPBakery Page Builder

High
VulnerabilityCVE-2025-53562cvecve-2025-53562cwe-79
Published: Wed Aug 20 2025 (08/20/2025, 08:03:13 UTC)
Source: CVE Database V5
Vendor/Project: LambertGroup
Product: Universal Video Player - Addon for WPBakery Page Builder

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Universal Video Player - Addon for WPBakery Page Builder allows Reflected XSS. This issue affects Universal Video Player - Addon for WPBakery Page Builder: from n/a through 3.2.1.

AI-Powered Analysis

AILast updated: 08/20/2025, 09:02:54 UTC

Technical Analysis

CVE-2025-53562 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the LambertGroup Universal Video Player - Addon for WPBakery Page Builder, a popular WordPress plugin used to embed and manage video content within websites. The vulnerability arises due to improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the plugin fails to adequately sanitize or encode input parameters that are reflected back in the web page output, allowing an attacker to inject malicious scripts. When a victim visits a crafted URL containing the malicious payload, the script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score of 7.1 reflects the vulnerability's characteristics: it can be exploited remotely over the network without authentication (AV:N/AC:L/PR:N), but requires user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). No known exploits in the wild have been reported yet, and no patches have been linked at the time of publication. The affected versions include all versions up to 3.2.1. Given the widespread use of WPBakery Page Builder and its addons in WordPress sites, this vulnerability poses a significant risk to websites utilizing this plugin, especially those with high traffic or sensitive user data.

Potential Impact

For European organizations, this vulnerability can have serious consequences. Websites using the Universal Video Player addon may be targeted to inject malicious scripts that steal user credentials, perform unauthorized actions, or spread malware. This can lead to data breaches involving personal data protected under GDPR, resulting in regulatory fines and reputational damage. E-commerce sites, government portals, and media companies using this plugin are particularly at risk. The reflected XSS can also be leveraged in phishing campaigns targeting European users, increasing the risk of broader compromise. Additionally, the scope change in the CVSS vector suggests that exploitation could affect other components or users beyond the initial vulnerable plugin, amplifying the potential damage. The lack of a patch at publication time means organizations must act quickly to mitigate exposure. The impact on availability is limited but could include denial of service through script-based attacks or browser crashes. Overall, the vulnerability threatens confidentiality, integrity, and availability of affected web assets and user data within European organizations.

Mitigation Recommendations

1. Immediate mitigation should include disabling or removing the Universal Video Player addon for WPBakery Page Builder until a vendor patch is released. 2. Employ Web Application Firewalls (WAFs) with updated rules to detect and block reflected XSS payloads targeting this plugin. 3. Implement strict Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of injected scripts. 4. Conduct thorough input validation and output encoding on all user-supplied data within the web application, especially if customizations or overrides of the plugin exist. 5. Monitor web server logs and application logs for suspicious requests containing script tags or unusual query parameters. 6. Educate web administrators and developers on the risks of reflected XSS and the importance of timely patching. 7. Once a patch is available, prioritize testing and deployment in all affected environments. 8. Consider using security scanners to identify vulnerable plugin versions across the organization's web assets. 9. For sites where disabling the plugin is not feasible, consider isolating the affected functionality or restricting access to trusted users only.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-07-03T14:50:56.330Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a584b8ad5a09ad0002e3ac

Added to database: 8/20/2025, 8:18:00 AM

Last enriched: 8/20/2025, 9:02:54 AM

Last updated: 8/23/2025, 12:35:19 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats