Skip to main content

CVE-2025-6716: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI

Medium
VulnerabilityCVE-2025-6716cvecve-2025-6716cwe-79
Published: Fri Jul 11 2025 (07/11/2025, 06:43:33 UTC)
Source: CVE Database V5
Vendor/Project: contest-gallery
Product: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI

Description

The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'upload[1][title]' parameter in all versions up to, and including, 26.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:16:21 UTC

Technical Analysis

CVE-2025-6716 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting the WordPress plugin 'Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI'. This plugin integrates multiple social media and ecommerce functionalities, allowing users to upload content, vote, sell items via PayPal or Stripe, and share on social platforms. The vulnerability arises from improper neutralization of input during web page generation, specifically through the 'upload[1][title]' parameter. In all versions up to and including 26.0.8, the plugin fails to sufficiently sanitize and escape user-supplied input in this parameter. As a result, authenticated users with Author-level privileges or higher can inject arbitrary JavaScript code that is stored persistently and executed whenever any user accesses the affected page. The CVSS 3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the level of an authenticated user with author rights, but does not require user interaction. The scope is changed, indicating that the vulnerability can affect resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are reported in the wild yet. The vulnerability poses a risk of session hijacking, defacement, or redirection to malicious sites, potentially compromising user accounts and site integrity. Since the plugin is widely used in WordPress environments that handle social media content and ecommerce transactions, exploitation could undermine trust and result in financial or reputational damage.

Potential Impact

For European organizations, this vulnerability can have significant consequences, especially for those relying on WordPress sites for ecommerce, social engagement, or community-driven content. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, perform actions on behalf of users, or redirect visitors to phishing or malware sites. This can result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and loss of customer trust. Ecommerce functionalities integrated with PayPal or Stripe increase the risk of financial fraud or transaction manipulation. Additionally, the presence of social share buttons and integrations with platforms like Instagram, TikTok, and Twitter means that malicious scripts could propagate through social channels, amplifying the impact. The requirement for Author-level access means internal threat actors or compromised accounts pose a risk, highlighting the importance of strict access controls. The medium severity score suggests that while the vulnerability is not trivial, it is exploitable without complex conditions, making it a credible threat vector. European organizations with public-facing WordPress sites using this plugin should consider the reputational and operational risks, especially in sectors like retail, media, and online communities.

Mitigation Recommendations

1. Immediate update: Although no patch links are provided, organizations should monitor the plugin vendor's official channels for security updates or patches addressing CVE-2025-6716 and apply them promptly. 2. Access control tightening: Restrict Author-level privileges strictly to trusted users. Implement role-based access controls and regularly audit user permissions to minimize the number of users who can exploit this vulnerability. 3. Input validation and sanitization: If custom development or temporary fixes are possible, implement server-side input validation and output escaping for the 'upload[1][title]' parameter to neutralize malicious scripts. 4. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block malicious payloads targeting this parameter or typical XSS attack patterns. 5. Monitoring and logging: Enhance monitoring of user activities, especially those with Author or higher privileges, and log suspicious input attempts. 6. User awareness and training: Educate content authors and administrators about the risks of uploading untrusted content and recognizing signs of compromise. 7. Incident response readiness: Prepare to respond to potential exploitation, including session invalidation, forensic analysis, and communication plans. 8. Consider disabling or replacing the plugin temporarily if patching is not immediately possible, especially if the plugin is critical but the risk is unacceptable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-26T13:33:33.725Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6870b6b3a83201eaacacdbdd

Added to database: 7/11/2025, 7:01:07 AM

Last enriched: 7/11/2025, 7:16:21 AM

Last updated: 7/11/2025, 7:21:00 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats