CVE-2025-60132: Cross-Site Request Forgery (CSRF) in johnh10 Video Blogster Lite
Cross-Site Request Forgery (CSRF) vulnerability in johnh10 Video Blogster Lite video-blogster-lite allows Stored XSS.This issue affects Video Blogster Lite: from n/a through <= 1.2.
AI Analysis
Technical Summary
CVE-2025-60132 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the johnh10 Video Blogster Lite plugin, a tool used to embed and manage video content on websites. The vulnerability exists in versions up to and including 1.2. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to the web application, potentially causing unauthorized actions without the user's consent. In this case, the CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist on the server and execute in the context of other users' browsers. This combination increases the attack surface by enabling attackers to bypass normal input validation and execute malicious scripts, potentially stealing session tokens or performing actions on behalf of users. The CVSS score of 4.3 reflects a medium severity, indicating that while the attack vector is remote and requires user interaction, no privileges or authentication are needed. The vulnerability affects the integrity of the system by allowing unauthorized modifications but does not directly impact confidentiality or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.
Potential Impact
For European organizations, the impact centers on the potential compromise of website integrity and user trust. Attackers exploiting this vulnerability could inject malicious scripts that execute in the browsers of site visitors or administrators, leading to session hijacking, defacement, or distribution of malware. This can damage brand reputation and lead to regulatory scrutiny under GDPR if personal data is exposed or manipulated. Since Video Blogster Lite is a plugin commonly used in WordPress environments, organizations relying on this tool for video content management on public-facing websites are at risk. The vulnerability does not directly affect system availability or confidentiality but can facilitate further attacks that do. The lack of authentication requirements lowers the barrier for attackers, increasing the likelihood of exploitation in environments where user interaction can be induced, such as through phishing or social engineering campaigns.
Mitigation Recommendations
Organizations should immediately audit their use of the Video Blogster Lite plugin and identify affected versions. Until an official patch is released, implement compensating controls such as deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns. Enforce strict Content Security Policies (CSP) to limit script execution sources. Educate users and administrators about phishing risks to reduce the chance of user interaction leading to exploitation. Review and harden authentication and session management mechanisms to limit the impact of potential XSS attacks. Monitor logs for unusual POST requests or changes to video content that could indicate exploitation attempts. Once patches become available, prioritize immediate updates to the plugin. Additionally, developers should incorporate anti-CSRF tokens in forms and validate the origin of requests to prevent unauthorized actions.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands
CVE-2025-60132: Cross-Site Request Forgery (CSRF) in johnh10 Video Blogster Lite
Description
Cross-Site Request Forgery (CSRF) vulnerability in johnh10 Video Blogster Lite video-blogster-lite allows Stored XSS.This issue affects Video Blogster Lite: from n/a through <= 1.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-60132 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the johnh10 Video Blogster Lite plugin, a tool used to embed and manage video content on websites. The vulnerability exists in versions up to and including 1.2. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to the web application, potentially causing unauthorized actions without the user's consent. In this case, the CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist on the server and execute in the context of other users' browsers. This combination increases the attack surface by enabling attackers to bypass normal input validation and execute malicious scripts, potentially stealing session tokens or performing actions on behalf of users. The CVSS score of 4.3 reflects a medium severity, indicating that while the attack vector is remote and requires user interaction, no privileges or authentication are needed. The vulnerability affects the integrity of the system by allowing unauthorized modifications but does not directly impact confidentiality or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.
Potential Impact
For European organizations, the impact centers on the potential compromise of website integrity and user trust. Attackers exploiting this vulnerability could inject malicious scripts that execute in the browsers of site visitors or administrators, leading to session hijacking, defacement, or distribution of malware. This can damage brand reputation and lead to regulatory scrutiny under GDPR if personal data is exposed or manipulated. Since Video Blogster Lite is a plugin commonly used in WordPress environments, organizations relying on this tool for video content management on public-facing websites are at risk. The vulnerability does not directly affect system availability or confidentiality but can facilitate further attacks that do. The lack of authentication requirements lowers the barrier for attackers, increasing the likelihood of exploitation in environments where user interaction can be induced, such as through phishing or social engineering campaigns.
Mitigation Recommendations
Organizations should immediately audit their use of the Video Blogster Lite plugin and identify affected versions. Until an official patch is released, implement compensating controls such as deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns. Enforce strict Content Security Policies (CSP) to limit script execution sources. Educate users and administrators about phishing risks to reduce the chance of user interaction leading to exploitation. Review and harden authentication and session management mechanisms to limit the impact of potential XSS attacks. Monitor logs for unusual POST requests or changes to video content that could indicate exploitation attempts. Once patches become available, prioritize immediate updates to the plugin. Additionally, developers should incorporate anti-CSRF tokens in forms and validate the origin of requests to prevent unauthorized actions.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:20:34.879Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8eff504677bbd79439a72
Added to database: 10/22/2025, 2:53:41 PM
Last enriched: 1/20/2026, 9:41:57 PM
Last updated: 2/7/2026, 2:37:47 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.