Skip to main content

CVE-2025-8071: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 995525477-1 Video and Audio Player for WordPress – Mine CloudVod LMS

Medium
VulnerabilityCVE-2025-8071cvecve-2025-8071cwe-79
Published: Thu Jul 24 2025 (07/24/2025, 09:22:17 UTC)
Source: CVE Database V5
Vendor/Project: 995525477-1
Product: Video and Audio Player for WordPress – Mine CloudVod LMS

Description

Mine CloudVod plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘audio’ parameter in all versions up to, and including, 2.1.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 07/24/2025, 09:48:48 UTC

Technical Analysis

CVE-2025-8071 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Mine CloudVod LMS Video and Audio Player plugin for WordPress, identified as version 2.1.10 and earlier. The vulnerability arises from improper neutralization of input during web page generation, specifically via the 'audio' parameter. Authenticated users with Contributor-level privileges or higher can exploit this flaw by injecting malicious JavaScript code into pages served by the plugin. Because the injected scripts are stored persistently, they execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The vulnerability is classified under CWE-79, indicating insufficient input sanitization and output escaping. The CVSS v3.1 base score is 6.4 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (Contributor or above), no user interaction, and a scope change, impacting confidentiality and integrity but not availability. No known public exploits have been reported yet, and no patches are currently linked, suggesting that mitigation may require manual intervention or vendor updates. The vulnerability affects all versions up to 2.1.10, implying widespread exposure for sites using this plugin without updates or mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress sites with the Mine CloudVod LMS plugin for delivering video and audio content. Exploitation could lead to unauthorized script execution, enabling attackers to steal session cookies, impersonate users, or inject further malicious payloads. This compromises the confidentiality and integrity of user data and site content. Educational institutions, e-learning platforms, and media companies using this plugin are particularly at risk. The scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially compromised component, potentially impacting other parts of the WordPress site or integrated systems. Given the Contributor-level access requirement, insider threats or compromised accounts could be leveraged to exploit this vulnerability. The absence of user interaction means exploitation can occur silently, increasing the risk of undetected compromise. While availability is not directly impacted, the reputational damage and potential data breaches could have regulatory consequences under GDPR for European entities.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations for the presence of the Mine CloudVod LMS plugin and verify the version in use. Until an official patch is released, organizations should restrict Contributor-level permissions strictly, ensuring only trusted users have such access. Implementing Web Application Firewalls (WAF) with custom rules to detect and block suspicious payloads targeting the 'audio' parameter can reduce risk. Input validation and output encoding should be enforced at the application level if possible, potentially through custom plugin modifications or overrides. Monitoring logs for unusual activity related to the plugin and user actions can help detect exploitation attempts early. Organizations should also consider disabling or removing the plugin if it is not essential. Regular backups and incident response plans should be updated to handle potential XSS incidents. Finally, staying informed about vendor updates and applying patches promptly once available is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-23T04:17:49.918Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6881fdd8ad5a09ad0033bf23

Added to database: 7/24/2025, 9:33:12 AM

Last enriched: 7/24/2025, 9:48:48 AM

Last updated: 8/18/2025, 1:22:23 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats