Skip to main content

CVE-2025-6692: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hanucodes YouTube Embed – YouTube Gallery, Vimeo Gallery – WordPress Plugin

Medium
VulnerabilityCVE-2025-6692cvecve-2025-6692cwe-79
Published: Tue Jul 29 2025 (07/29/2025, 09:23:46 UTC)
Source: CVE Database V5
Vendor/Project: hanucodes
Product: YouTube Embed – YouTube Gallery, Vimeo Gallery – WordPress Plugin

Description

The YouTube Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘instance’ parameter in all versions up to, and including, 10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/29/2025, 09:48:22 UTC

Technical Analysis

CVE-2025-6692 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the 'YouTube Embed – YouTube Gallery, Vimeo Gallery' WordPress plugin developed by hanucodes. This vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, the plugin fails to adequately sanitize and escape the 'instance' parameter, which is used in embedding YouTube or Vimeo galleries on WordPress sites. As a result, authenticated users with Contributor-level privileges or higher can inject arbitrary malicious JavaScript code into pages. Because the vulnerability is stored, the injected scripts persist in the website’s content and execute whenever any user accesses the compromised page. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and a scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects all versions up to and including 10.3 of the plugin. This issue is significant because WordPress is widely used across many organizations, and plugins like this are common for embedding multimedia content, making it a potential vector for persistent XSS attacks that can lead to session hijacking, defacement, or further exploitation of user browsers.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites using the affected WordPress plugin for embedding YouTube or Vimeo galleries. Successful exploitation can lead to unauthorized script execution in the context of the affected website, potentially compromising user sessions, stealing sensitive information, or performing actions on behalf of users. This can damage organizational reputation, lead to data breaches involving personal data protected under GDPR, and cause regulatory compliance issues. Since the attack requires authenticated Contributor-level access, insider threats or compromised accounts are the most likely exploitation vectors. The scope change in the CVSS vector indicates that the vulnerability could affect components beyond the plugin itself, potentially impacting other parts of the website or integrated systems. Given the widespread use of WordPress in Europe, including by SMEs, public institutions, and media companies, the vulnerability could be leveraged to target a broad range of sectors. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once publicly disclosed.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately audit WordPress installations to identify the presence of the 'YouTube Embed – YouTube Gallery, Vimeo Gallery' plugin and verify the version in use. 2) Restrict Contributor-level and higher privileges strictly to trusted users, implementing the principle of least privilege to reduce the risk of insider exploitation. 3) Monitor and review content submissions and edits involving the 'instance' parameter or embedded galleries for suspicious scripts or anomalies. 4) Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'instance' parameter. 5) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected web pages. 6) Stay alert for official patches or updates from the plugin vendor and apply them promptly once available. 7) Conduct regular security training for content editors and administrators to recognize and report suspicious activity. 8) Consider temporarily disabling or replacing the plugin with alternative, secure solutions if immediate patching is not possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-25T22:45:19.150Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68889537ad5a09ad008cc7dc

Added to database: 7/29/2025, 9:32:39 AM

Last enriched: 7/29/2025, 9:48:22 AM

Last updated: 7/29/2025, 2:32:42 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats