CVE-2025-6716: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI
The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'upload[1][title]' parameter in all versions up to, and including, 26.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-6716 is a stored Cross-Site Scripting (XSS) vulnerability identified in the contest-gallery WordPress plugin, which supports media uploads, voting, ecommerce transactions via PayPal or Stripe, and social sharing integrations including YouTube, Twitter, Instagram, TikTok, and OpenAI features. The vulnerability specifically resides in the 'upload[1][title]' parameter, which is insufficiently sanitized and escaped before being rendered on web pages. This flaw allows authenticated users with Author-level access or higher to inject arbitrary JavaScript code that is stored persistently and executed in the browsers of any users who visit the compromised pages. The vulnerability affects all versions up to and including 26.0.8. The CVSS v3.1 base score is 6.4, with vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, indicating network exploitable, low attack complexity, requires privileges but no user interaction, with a scope change and limited confidentiality and integrity impact but no availability impact. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deface content. No public exploits are currently known, but the presence of ecommerce and social features increases the attractiveness of this vector for attackers. The plugin’s widespread use in WordPress sites that run contests or ecommerce campaigns makes this a significant risk. The root cause is improper neutralization of input during web page generation (CWE-79).
Potential Impact
The impact of CVE-2025-6716 is primarily on the confidentiality and integrity of affected WordPress sites using the contest-gallery plugin. Attackers with Author-level access can inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, unauthorized actions, data theft, or defacement. Because the plugin supports ecommerce transactions and social sharing, attackers could manipulate payment processes or spread malicious content via social platforms. The vulnerability does not affect availability directly but can degrade user trust and site reputation. Organizations with multi-user environments, especially those allowing Author-level roles or higher, are at increased risk. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the vulnerable component, increasing risk. Although no known exploits exist yet, the ease of exploitation and the common use of this plugin in contest and ecommerce scenarios worldwide make this a significant threat to website security and user data privacy.
Mitigation Recommendations
To mitigate CVE-2025-6716, organizations should immediately update the contest-gallery plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should restrict Author-level and higher privileges to trusted users only and review user roles to minimize exposure. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious payloads targeting the 'upload[1][title]' parameter can help reduce risk. Additionally, site owners should enable Content Security Policy (CSP) headers to limit the impact of injected scripts. Regularly audit and sanitize all user-generated content inputs, especially those rendered on public pages. Monitoring logs for suspicious activity related to uploads or script injections is recommended. Finally, educating users about the risks of privilege escalation and enforcing the principle of least privilege will reduce the attack surface.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, South Korea
CVE-2025-6716: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI
Description
The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'upload[1][title]' parameter in all versions up to, and including, 26.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-6716 is a stored Cross-Site Scripting (XSS) vulnerability identified in the contest-gallery WordPress plugin, which supports media uploads, voting, ecommerce transactions via PayPal or Stripe, and social sharing integrations including YouTube, Twitter, Instagram, TikTok, and OpenAI features. The vulnerability specifically resides in the 'upload[1][title]' parameter, which is insufficiently sanitized and escaped before being rendered on web pages. This flaw allows authenticated users with Author-level access or higher to inject arbitrary JavaScript code that is stored persistently and executed in the browsers of any users who visit the compromised pages. The vulnerability affects all versions up to and including 26.0.8. The CVSS v3.1 base score is 6.4, with vector AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, indicating network exploitable, low attack complexity, requires privileges but no user interaction, with a scope change and limited confidentiality and integrity impact but no availability impact. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deface content. No public exploits are currently known, but the presence of ecommerce and social features increases the attractiveness of this vector for attackers. The plugin’s widespread use in WordPress sites that run contests or ecommerce campaigns makes this a significant risk. The root cause is improper neutralization of input during web page generation (CWE-79).
Potential Impact
The impact of CVE-2025-6716 is primarily on the confidentiality and integrity of affected WordPress sites using the contest-gallery plugin. Attackers with Author-level access can inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, unauthorized actions, data theft, or defacement. Because the plugin supports ecommerce transactions and social sharing, attackers could manipulate payment processes or spread malicious content via social platforms. The vulnerability does not affect availability directly but can degrade user trust and site reputation. Organizations with multi-user environments, especially those allowing Author-level roles or higher, are at increased risk. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the vulnerable component, increasing risk. Although no known exploits exist yet, the ease of exploitation and the common use of this plugin in contest and ecommerce scenarios worldwide make this a significant threat to website security and user data privacy.
Mitigation Recommendations
To mitigate CVE-2025-6716, organizations should immediately update the contest-gallery plugin to a version that addresses this vulnerability once available. In the absence of an official patch, administrators should restrict Author-level and higher privileges to trusted users only and review user roles to minimize exposure. Implementing a Web Application Firewall (WAF) with rules to detect and block malicious payloads targeting the 'upload[1][title]' parameter can help reduce risk. Additionally, site owners should enable Content Security Policy (CSP) headers to limit the impact of injected scripts. Regularly audit and sanitize all user-generated content inputs, especially those rendered on public pages. Monitoring logs for suspicious activity related to uploads or script injections is recommended. Finally, educating users about the risks of privilege escalation and enforcing the principle of least privilege will reduce the attack surface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-26T13:33:33.725Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6870b6b3a83201eaacacdbdd
Added to database: 7/11/2025, 7:01:07 AM
Last enriched: 2/26/2026, 3:44:58 PM
Last updated: 3/24/2026, 9:34:21 AM
Views: 125
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.