CVE-2025-6716: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI
The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'upload[1][title]' parameter in all versions up to, and including, 26.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-6716 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting the WordPress plugin 'Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI'. This plugin integrates multiple social media and ecommerce functionalities, allowing users to upload content, vote, sell items via PayPal or Stripe, and share on social platforms. The vulnerability arises from improper neutralization of input during web page generation, specifically through the 'upload[1][title]' parameter. In all versions up to and including 26.0.8, the plugin fails to sufficiently sanitize and escape user-supplied input in this parameter. As a result, authenticated users with Author-level privileges or higher can inject arbitrary JavaScript code that is stored persistently and executed whenever any user accesses the affected page. The CVSS 3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the level of an authenticated user with author rights, but does not require user interaction. The scope is changed, indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are reported in the wild yet. The vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites, potentially compromising user accounts and site integrity. Since the plugin is widely used in WordPress environments that handle social media content and ecommerce transactions, exploitation could undermine trust and result in financial or reputational damage.
Potential Impact
For European organizations, this vulnerability can have significant consequences, especially for those relying on WordPress sites for ecommerce, social engagement, or community-driven content. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, perform actions on behalf of users, or redirect visitors to phishing or malware sites. This can result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and loss of customer trust. Ecommerce functionalities integrated with PayPal or Stripe increase the risk of financial fraud or transaction manipulation. Additionally, the presence of social share buttons and integrations with platforms like Instagram, TikTok, and Twitter means that malicious scripts could propagate through social channels, amplifying the impact. The requirement for Author-level access means internal threat actors or compromised accounts pose a risk, highlighting the importance of strict access controls. The medium severity score suggests that while the vulnerability is not trivial, it is exploitable without complex conditions, making it a credible threat vector. European organizations with public-facing WordPress sites using this plugin should consider the reputational and operational risks, especially in sectors like retail, media, and online communities.
Mitigation Recommendations
1. Immediate update: Although no patch links are provided, organizations should monitor the plugin vendor's official channels for security updates or patches addressing CVE-2025-6716 and apply them promptly. 2. Access control tightening: Restrict Author-level privileges strictly to trusted users. Implement role-based access controls and regularly audit user permissions to minimize the number of users who can exploit this vulnerability. 3. Input validation and sanitization: If custom development or temporary fixes are possible, implement server-side input validation and output escaping for the 'upload[1][title]' parameter to neutralize malicious scripts. 4. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting this parameter or typical XSS attack patterns. 5. Monitoring and logging: Enhance monitoring of user activities, especially those with Author or higher privileges, and log suspicious input attempts. 6. User awareness and training: Educate content authors and administrators about the risks of uploading untrusted content and recognizing signs of compromise. 7. Incident response readiness: Prepare to respond to potential exploitation, including session invalidation, forensic analysis, and communication plans. 8. Consider disabling or replacing the plugin temporarily if patching is not immediately possible, especially if the plugin is critical but the risk is unacceptable.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-6716: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI
Description
The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'upload[1][title]' parameter in all versions up to, and including, 26.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-6716 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting the WordPress plugin 'Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI'. This plugin integrates multiple social media and ecommerce functionalities, allowing users to upload content, vote, sell items via PayPal or Stripe, and share on social platforms. The vulnerability arises from improper neutralization of input during web page generation, specifically through the 'upload[1][title]' parameter. In all versions up to and including 26.0.8, the plugin fails to sufficiently sanitize and escape user-supplied input in this parameter. As a result, authenticated users with Author-level privileges or higher can inject arbitrary JavaScript code that is stored persistently and executed whenever any user accesses the affected page. The CVSS 3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the level of an authenticated user with author rights, but does not require user interaction. The scope is changed, indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are reported in the wild yet. The vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites, potentially compromising user accounts and site integrity. Since the plugin is widely used in WordPress environments that handle social media content and ecommerce transactions, exploitation could undermine trust and result in financial or reputational damage.
Potential Impact
For European organizations, this vulnerability can have significant consequences, especially for those relying on WordPress sites for ecommerce, social engagement, or community-driven content. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, perform actions on behalf of users, or redirect visitors to phishing or malware sites. This can result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and loss of customer trust. Ecommerce functionalities integrated with PayPal or Stripe increase the risk of financial fraud or transaction manipulation. Additionally, the presence of social share buttons and integrations with platforms like Instagram, TikTok, and Twitter means that malicious scripts could propagate through social channels, amplifying the impact. The requirement for Author-level access means internal threat actors or compromised accounts pose a risk, highlighting the importance of strict access controls. The medium severity score suggests that while the vulnerability is not trivial, it is exploitable without complex conditions, making it a credible threat vector. European organizations with public-facing WordPress sites using this plugin should consider the reputational and operational risks, especially in sectors like retail, media, and online communities.
Mitigation Recommendations
1. Immediate update: Although no patch links are provided, organizations should monitor the plugin vendor's official channels for security updates or patches addressing CVE-2025-6716 and apply them promptly. 2. Access control tightening: Restrict Author-level privileges strictly to trusted users. Implement role-based access controls and regularly audit user permissions to minimize the number of users who can exploit this vulnerability. 3. Input validation and sanitization: If custom development or temporary fixes are possible, implement server-side input validation and output escaping for the 'upload[1][title]' parameter to neutralize malicious scripts. 4. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting this parameter or typical XSS attack patterns. 5. Monitoring and logging: Enhance monitoring of user activities, especially those with Author or higher privileges, and log suspicious input attempts. 6. User awareness and training: Educate content authors and administrators about the risks of uploading untrusted content and recognizing signs of compromise. 7. Incident response readiness: Prepare to respond to potential exploitation, including session invalidation, forensic analysis, and communication plans. 8. Consider disabling or replacing the plugin temporarily if patching is not immediately possible, especially if the plugin is critical but the risk is unacceptable.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-26T13:33:33.725Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6870b6b3a83201eaacacdbdd
Added to database: 7/11/2025, 7:01:07 AM
Last enriched: 7/11/2025, 7:16:21 AM
Last updated: 7/11/2025, 7:21:00 AM
Views: 3
Related Threats
CVE-2025-7442: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dasinfomedia WPGYM - Wordpress Gym Management System
HighCVE-2025-6745: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in xTemos Woodmart
MediumCVE-2025-6068: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bradvin FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel
MediumCVE-2025-5530: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpclever WPC Smart Compare for WooCommerce
MediumCVE-2025-4593: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in avimegladon WP Register Profile With Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.