CVE-2025-60104: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Jordy Meow Gallery Custom Links
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jordy Meow Gallery Custom Links allows Stored XSS. This issue affects Gallery Custom Links: from n/a through 2.2.5.
AI Analysis
Technical Summary
CVE-2025-60104 is a medium-severity vulnerability classified under CWE-79, which pertains to Improper Neutralization of Input During Web Page Generation, commonly known as Cross-site Scripting (XSS). This vulnerability affects the Jordy Meow Gallery Custom Links plugin, versions up to and including 2.2.5. The flaw allows an attacker to inject malicious scripts that are stored persistently within the application, leading to Stored XSS. Stored XSS occurs when malicious input is saved by the application and later rendered in web pages without proper sanitization or encoding, enabling the execution of arbitrary JavaScript in the context of users’ browsers. The CVSS 3.1 base score of 5.9 reflects a medium severity, with the vector indicating that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, and the impact is low on confidentiality, integrity, and availability (C:L/I:L/A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient input validation or output encoding during web page generation, allowing malicious payloads to be stored and executed when other users view the affected content. This can lead to session hijacking, defacement, or redirection to malicious sites, undermining user trust and potentially enabling further attacks.
Potential Impact
For European organizations using the Jordy Meow Gallery Custom Links plugin, this vulnerability poses a risk primarily to web applications that rely on this plugin for managing gallery links. Exploitation could lead to unauthorized script execution in users’ browsers, potentially resulting in session theft, credential compromise, or unauthorized actions performed on behalf of users. This can damage the reputation of organizations, lead to data breaches, and violate data protection regulations such as GDPR if personal data is exposed or manipulated. Given the requirement for high privileges to exploit and user interaction, the risk is somewhat mitigated but still significant for administrative users or trusted roles. Organizations in sectors with high web presence, such as media, e-commerce, and cultural institutions, may face increased risk. Additionally, the cross-site scripting vulnerability could be leveraged as a stepping stone for more complex attacks, including phishing or malware distribution campaigns targeting European users.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting access to the Gallery Custom Links plugin until a patch is available. 2. Implement strict input validation and output encoding on all user-supplied data within the plugin, especially for fields that generate web page content. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Conduct thorough code review and security testing of the plugin to identify and remediate all instances of improper input handling. 5. Educate administrators and users about the risks of clicking on untrusted links or interacting with suspicious content within the gallery. 6. Monitor web application logs for unusual activities or injection attempts related to the plugin. 7. Once a patch is released by Jordy Meow, prioritize prompt application of updates. 8. Consider implementing web application firewalls (WAF) with rules to detect and block XSS payloads targeting this plugin.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-60104: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Jordy Meow Gallery Custom Links
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jordy Meow Gallery Custom Links allows Stored XSS. This issue affects Gallery Custom Links: from n/a through 2.2.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-60104 is a medium-severity vulnerability classified under CWE-79, which pertains to Improper Neutralization of Input During Web Page Generation, commonly known as Cross-site Scripting (XSS). This vulnerability affects the Jordy Meow Gallery Custom Links plugin, versions up to and including 2.2.5. The flaw allows an attacker to inject malicious scripts that are stored persistently within the application, leading to Stored XSS. Stored XSS occurs when malicious input is saved by the application and later rendered in web pages without proper sanitization or encoding, enabling the execution of arbitrary JavaScript in the context of users’ browsers. The CVSS 3.1 base score of 5.9 reflects a medium severity, with the vector indicating that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, and the impact is low on confidentiality, integrity, and availability (C:L/I:L/A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient input validation or output encoding during web page generation, allowing malicious payloads to be stored and executed when other users view the affected content. This can lead to session hijacking, defacement, or redirection to malicious sites, undermining user trust and potentially enabling further attacks.
Potential Impact
For European organizations using the Jordy Meow Gallery Custom Links plugin, this vulnerability poses a risk primarily to web applications that rely on this plugin for managing gallery links. Exploitation could lead to unauthorized script execution in users’ browsers, potentially resulting in session theft, credential compromise, or unauthorized actions performed on behalf of users. This can damage the reputation of organizations, lead to data breaches, and violate data protection regulations such as GDPR if personal data is exposed or manipulated. Given the requirement for high privileges to exploit and user interaction, the risk is somewhat mitigated but still significant for administrative users or trusted roles. Organizations in sectors with high web presence, such as media, e-commerce, and cultural institutions, may face increased risk. Additionally, the cross-site scripting vulnerability could be leveraged as a stepping stone for more complex attacks, including phishing or malware distribution campaigns targeting European users.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting access to the Gallery Custom Links plugin until a patch is available. 2. Implement strict input validation and output encoding on all user-supplied data within the plugin, especially for fields that generate web page content. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Conduct thorough code review and security testing of the plugin to identify and remediate all instances of improper input handling. 5. Educate administrators and users about the risks of clicking on untrusted links or interacting with suspicious content within the gallery. 6. Monitor web application logs for unusual activities or injection attempts related to the plugin. 7. Once a patch is released by Jordy Meow, prioritize prompt application of updates. 8. Consider implementing web application firewalls (WAF) with rules to detect and block XSS payloads targeting this plugin.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:20:16.564Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d72b6379aa5c9d0854f51b
Added to database: 9/27/2025, 12:10:11 AM
Last enriched: 10/4/2025, 12:39:40 AM
Last updated: 11/8/2025, 9:58:47 PM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12914: SQL Injection in aaPanel BaoTa
MediumCVE-2025-12913: SQL Injection in code-projects Responsive Hotel Site
MediumCVE-2025-12837: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub aThemes Addons for Elementor
MediumCVE-2025-12643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in saphali Saphali LiqPay for donate
MediumCVE-2025-12399: CWE-434 Unrestricted Upload of File with Dangerous Type in alexreservations Alex Reservations: Smart Restaurant Booking
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.