Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60132: Cross-Site Request Forgery (CSRF) in johnh10 Video Blogster Lite

0
Medium
VulnerabilityCVE-2025-60132cvecve-2025-60132
Published: Wed Oct 22 2025 (10/22/2025, 14:32:40 UTC)
Source: CVE Database V5
Vendor/Project: johnh10
Product: Video Blogster Lite

Description

Cross-Site Request Forgery (CSRF) vulnerability in johnh10 Video Blogster Lite video-blogster-lite allows Stored XSS.This issue affects Video Blogster Lite: from n/a through <= 1.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:41:57 UTC

Technical Analysis

CVE-2025-60132 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the johnh10 Video Blogster Lite plugin, a tool used to embed and manage video content on websites. The vulnerability exists in versions up to and including 1.2. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted requests to the web application, potentially causing unauthorized actions without the user's consent. In this case, the CSRF flaw can be leveraged to inject stored Cross-Site Scripting (XSS) payloads, which persist on the server and execute in the context of other users' browsers. This combination increases the attack surface by enabling attackers to bypass normal input validation and execute malicious scripts, potentially stealing session tokens or performing actions on behalf of users. The CVSS score of 4.3 reflects a medium severity, indicating that while the attack vector is remote and requires user interaction, no privileges or authentication are needed. The vulnerability affects the integrity of the system by allowing unauthorized modifications but does not directly impact confidentiality or availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.

Potential Impact

For European organizations, the impact centers on the potential compromise of website integrity and user trust. Attackers exploiting this vulnerability could inject malicious scripts that execute in the browsers of site visitors or administrators, leading to session hijacking, defacement, or distribution of malware. This can damage brand reputation and lead to regulatory scrutiny under GDPR if personal data is exposed or manipulated. Since Video Blogster Lite is a plugin commonly used in WordPress environments, organizations relying on this tool for video content management on public-facing websites are at risk. The vulnerability does not directly affect system availability or confidentiality but can facilitate further attacks that do. The lack of authentication requirements lowers the barrier for attackers, increasing the likelihood of exploitation in environments where user interaction can be induced, such as through phishing or social engineering campaigns.

Mitigation Recommendations

Organizations should immediately audit their use of the Video Blogster Lite plugin and identify affected versions. Until an official patch is released, implement compensating controls such as deploying Web Application Firewalls (WAFs) with rules to detect and block CSRF and XSS attack patterns. Enforce strict Content Security Policies (CSP) to limit script execution sources. Educate users and administrators about phishing risks to reduce the chance of user interaction leading to exploitation. Review and harden authentication and session management mechanisms to limit the impact of potential XSS attacks. Monitor logs for unusual POST requests or changes to video content that could indicate exploitation attempts. Once patches become available, prioritize immediate updates to the plugin. Additionally, developers should incorporate anti-CSRF tokens in forms and validate the origin of requests to prevent unauthorized actions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:34.879Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8eff504677bbd79439a72

Added to database: 10/22/2025, 2:53:41 PM

Last enriched: 1/20/2026, 9:41:57 PM

Last updated: 2/5/2026, 1:41:53 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats