CVE-2025-53564: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LambertGroup HTML5 Radio Player - WPBakery Page Builder Addon
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup HTML5 Radio Player - WPBakery Page Builder Addon allows Reflected XSS. This issue affects HTML5 Radio Player - WPBakery Page Builder Addon: from n/a through 2.5.
AI Analysis
Technical Summary
CVE-2025-53564 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the LambertGroup HTML5 Radio Player - WPBakery Page Builder Addon. This vulnerability arises from improper neutralization of user input during web page generation, classified under CWE-79. Specifically, the affected component fails to adequately sanitize or encode input parameters before including them in dynamically generated web pages, allowing an attacker to inject malicious scripts. When a victim accesses a crafted URL or interacts with the vulnerable web page, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, defacement, or redirection to malicious sites. The vulnerability affects versions up to 2.5 of the addon, although exact version details are not fully specified. The CVSS v3.1 base score is 7.1, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect components beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is low but present (C:L/I:L/A:L). No public exploits have been reported yet, and no official patches or mitigation links are currently available. This vulnerability is particularly concerning for websites using the WPBakery Page Builder with the LambertGroup HTML5 Radio Player addon, as it can be exploited remotely without authentication, relying only on user interaction such as clicking a malicious link or visiting a crafted page.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those operating websites or web applications built on WordPress platforms utilizing the WPBakery Page Builder with the LambertGroup HTML5 Radio Player addon. Successful exploitation can lead to the compromise of user sessions, theft of sensitive data such as authentication tokens or personal information, and potential defacement or redirection attacks that damage brand reputation. Given the reflected XSS nature, phishing campaigns could leverage this vulnerability to trick users into executing malicious scripts, increasing the risk of broader social engineering attacks. Organizations in sectors with high web presence such as e-commerce, media, and public services are particularly vulnerable. Additionally, the scope change in the CVSS vector suggests that the impact could extend beyond the immediate component, potentially affecting other integrated plugins or backend systems. The lack of patches increases the window of exposure, and the ease of exploitation without authentication means attackers can target European users en masse. This could lead to regulatory compliance issues under GDPR if personal data is compromised through exploitation of this vulnerability.
Mitigation Recommendations
1. Immediate mitigation should include disabling or removing the LambertGroup HTML5 Radio Player - WPBakery Page Builder addon until a patch is released. 2. Implement Web Application Firewall (WAF) rules specifically targeting reflected XSS patterns related to the addon’s URL parameters to block malicious payloads. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 4. Conduct thorough input validation and output encoding on all user-supplied data within the web application, especially for parameters handled by the vulnerable addon. 5. Monitor web server logs and application logs for unusual request patterns or attempts to exploit XSS vectors. 6. Educate users and administrators about the risks of clicking unknown or suspicious links, as user interaction is required for exploitation. 7. Stay alert for official patches or updates from LambertGroup and apply them promptly once available. 8. Consider isolating or sandboxing the affected plugin’s functionality to limit potential damage. 9. Perform regular security assessments and penetration testing focused on XSS vulnerabilities in the web environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-53564: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in LambertGroup HTML5 Radio Player - WPBakery Page Builder Addon
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup HTML5 Radio Player - WPBakery Page Builder Addon allows Reflected XSS. This issue affects HTML5 Radio Player - WPBakery Page Builder Addon: from n/a through 2.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-53564 is a high-severity reflected Cross-site Scripting (XSS) vulnerability identified in the LambertGroup HTML5 Radio Player - WPBakery Page Builder Addon. This vulnerability arises from improper neutralization of user input during web page generation, classified under CWE-79. Specifically, the affected component fails to adequately sanitize or encode input parameters before including them in dynamically generated web pages, allowing an attacker to inject malicious scripts. When a victim accesses a crafted URL or interacts with the vulnerable web page, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, defacement, or redirection to malicious sites. The vulnerability affects versions up to 2.5 of the addon, although exact version details are not fully specified. The CVSS v3.1 base score is 7.1, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect components beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is low but present (C:L/I:L/A:L). No public exploits have been reported yet, and no official patches or mitigation links are currently available. This vulnerability is particularly concerning for websites using the WPBakery Page Builder with the LambertGroup HTML5 Radio Player addon, as it can be exploited remotely without authentication, relying only on user interaction such as clicking a malicious link or visiting a crafted page.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those operating websites or web applications built on WordPress platforms utilizing the WPBakery Page Builder with the LambertGroup HTML5 Radio Player addon. Successful exploitation can lead to the compromise of user sessions, theft of sensitive data such as authentication tokens or personal information, and potential defacement or redirection attacks that damage brand reputation. Given the reflected XSS nature, phishing campaigns could leverage this vulnerability to trick users into executing malicious scripts, increasing the risk of broader social engineering attacks. Organizations in sectors with high web presence such as e-commerce, media, and public services are particularly vulnerable. Additionally, the scope change in the CVSS vector suggests that the impact could extend beyond the immediate component, potentially affecting other integrated plugins or backend systems. The lack of patches increases the window of exposure, and the ease of exploitation without authentication means attackers can target European users en masse. This could lead to regulatory compliance issues under GDPR if personal data is compromised through exploitation of this vulnerability.
Mitigation Recommendations
1. Immediate mitigation should include disabling or removing the LambertGroup HTML5 Radio Player - WPBakery Page Builder addon until a patch is released. 2. Implement Web Application Firewall (WAF) rules specifically targeting reflected XSS patterns related to the addon’s URL parameters to block malicious payloads. 3. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 4. Conduct thorough input validation and output encoding on all user-supplied data within the web application, especially for parameters handled by the vulnerable addon. 5. Monitor web server logs and application logs for unusual request patterns or attempts to exploit XSS vectors. 6. Educate users and administrators about the risks of clicking unknown or suspicious links, as user interaction is required for exploitation. 7. Stay alert for official patches or updates from LambertGroup and apply them promptly once available. 8. Consider isolating or sandboxing the affected plugin’s functionality to limit potential damage. 9. Perform regular security assessments and penetration testing focused on XSS vulnerabilities in the web environment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-07-03T14:50:56.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a584b8ad5a09ad0002e3b2
Added to database: 8/20/2025, 8:18:00 AM
Last enriched: 8/20/2025, 8:49:28 AM
Last updated: 8/23/2025, 12:35:19 AM
Views: 2
Related Threats
CVE-2025-43767: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal
MediumCVE-2025-58043
LowCVE-2025-58042
LowCVE-2025-58041
LowCVE-2025-58040
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.