Skip to main content

CVE-2025-60104: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Jordy Meow Gallery Custom Links

Medium
VulnerabilityCVE-2025-60104cvecve-2025-60104cwe-79
Published: Fri Sep 26 2025 (09/26/2025, 08:31:24 UTC)
Source: CVE Database V5
Vendor/Project: Jordy Meow
Product: Gallery Custom Links

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jordy Meow Gallery Custom Links allows Stored XSS. This issue affects Gallery Custom Links: from n/a through 2.2.5.

AI-Powered Analysis

AILast updated: 09/27/2025, 00:21:53 UTC

Technical Analysis

CVE-2025-60104 is a medium severity vulnerability classified as CWE-79, indicating an Improper Neutralization of Input During Web Page Generation, commonly known as Cross-site Scripting (XSS). This vulnerability affects the Jordy Meow Gallery Custom Links plugin, specifically versions up to 2.2.5. The flaw allows an attacker to inject malicious scripts that are stored and later executed in the context of a victim's browser when they view the affected web pages. The vulnerability arises because the plugin does not properly sanitize or encode user-supplied input before embedding it into web pages, enabling stored XSS attacks. According to the CVSS v3.1 vector (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L), exploitation requires network access, low attack complexity, high privileges, and user interaction, with a scope change indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability loss, as the attacker can execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, defacement, or further exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on September 26, 2025, and assigned by Patchstack.

Potential Impact

For European organizations using the Jordy Meow Gallery Custom Links plugin, this vulnerability poses a risk primarily to web applications that rely on this plugin for managing gallery links. Successful exploitation could allow attackers to execute malicious scripts in the browsers of authenticated users, leading to session hijacking, unauthorized actions, or data leakage. This can compromise user trust, lead to data breaches involving personal or sensitive information, and potentially disrupt service availability through script-based attacks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face regulatory penalties if exploited. Additionally, the scope change in the CVSS vector suggests that the impact could extend beyond the plugin itself, potentially affecting other integrated systems or services. Although exploitation requires high privileges and user interaction, the risk remains significant for internal users or administrators who have elevated access and interact with the vulnerable component.

Mitigation Recommendations

1. Immediate mitigation should include auditing and restricting access to the Gallery Custom Links plugin to minimize exposure, especially limiting high-privilege user roles that can input data into the plugin. 2. Implement strict input validation and output encoding on all user-supplied data within the plugin to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Monitor web application logs for unusual input patterns or script injection attempts targeting the plugin. 5. Since no official patch is currently available, consider disabling or removing the plugin until a fix is released. 6. Educate users with high privileges about the risks of interacting with untrusted content and the importance of cautious behavior to prevent social engineering exploitation. 7. Regularly check for updates from the vendor or security advisories to apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:16.564Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d72b6379aa5c9d0854f51b

Added to database: 9/27/2025, 12:10:11 AM

Last enriched: 9/27/2025, 12:21:53 AM

Last updated: 9/27/2025, 1:39:10 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats