CVE-2025-9372: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gbsdeveloper Ultimate Multi Design Video Carousel
The Ultimate Multi Design Video Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-9372 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Ultimate Multi Design Video Carousel plugin for WordPress, versions up to and including 1.4. The vulnerability arises from insufficient input sanitization and output escaping during web page generation, allowing malicious scripts to be stored in the plugin’s data and executed in the context of users viewing the affected pages. This flaw is exploitable only by authenticated users with editor-level privileges, which means attackers must have elevated access to inject payloads. The vulnerability specifically affects WordPress multi-site installations or single sites where the unfiltered_html capability is disabled, limiting the scope but increasing risk in such configurations. When exploited, the attacker’s script executes in the browser of any user who visits the compromised page, potentially leading to session hijacking, privilege escalation, or data theft. The CVSS 3.1 score of 5.5 reflects a medium severity, with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change. No patches or known exploits are currently reported, but the vulnerability’s presence in a popular WordPress plugin used in multi-site environments makes it a notable risk. The lack of output escaping and input validation are the root causes, highlighting the need for secure coding practices in plugin development.
Potential Impact
The primary impact of this vulnerability is the potential for attackers with editor-level access to inject malicious JavaScript that executes in the browsers of users who view the affected pages. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and defacement of website content. Although exploitation requires elevated privileges, the risk is significant in environments where multiple users have editor access or where compromised editor accounts exist. Multi-site WordPress installations are particularly vulnerable, which are common in large organizations, educational institutions, and media companies. The vulnerability does not affect availability but compromises confidentiality and integrity. The medium CVSS score reflects that while the attack complexity is low, the prerequisite of high privileges limits exploitation scope. However, successful exploitation could facilitate further attacks within the network or site, increasing overall risk.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the use of the Ultimate Multi Design Video Carousel plugin, especially in multi-site environments. Until an official patch is released, administrators should restrict editor-level access to trusted users only and consider temporarily disabling or removing the plugin in multi-site setups. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections can provide interim protection. Monitoring user activity logs for unusual editor behavior can help detect exploitation attempts. Additionally, enabling Content Security Policy (CSP) headers can mitigate the impact of injected scripts by restricting script execution sources. Developers should update the plugin code to properly sanitize and escape all user inputs and outputs related to the plugin’s data handling. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, organizations should stay alert for official patches or updates from the vendor and apply them promptly once available.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Brazil, Japan, Netherlands
CVE-2025-9372: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gbsdeveloper Ultimate Multi Design Video Carousel
Description
The Ultimate Multi Design Video Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9372 is a stored cross-site scripting vulnerability classified under CWE-79, found in the Ultimate Multi Design Video Carousel plugin for WordPress, versions up to and including 1.4. The vulnerability arises from insufficient input sanitization and output escaping during web page generation, allowing malicious scripts to be stored in the plugin’s data and executed in the context of users viewing the affected pages. This flaw is exploitable only by authenticated users with editor-level privileges, which means attackers must have elevated access to inject payloads. The vulnerability specifically affects WordPress multi-site installations or single sites where the unfiltered_html capability is disabled, limiting the scope but increasing risk in such configurations. When exploited, the attacker’s script executes in the browser of any user who visits the compromised page, potentially leading to session hijacking, privilege escalation, or data theft. The CVSS 3.1 score of 5.5 reflects a medium severity, with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change. No patches or known exploits are currently reported, but the vulnerability’s presence in a popular WordPress plugin used in multi-site environments makes it a notable risk. The lack of output escaping and input validation are the root causes, highlighting the need for secure coding practices in plugin development.
Potential Impact
The primary impact of this vulnerability is the potential for attackers with editor-level access to inject malicious JavaScript that executes in the browsers of users who view the affected pages. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, and defacement of website content. Although exploitation requires elevated privileges, the risk is significant in environments where multiple users have editor access or where compromised editor accounts exist. Multi-site WordPress installations are particularly vulnerable, which are common in large organizations, educational institutions, and media companies. The vulnerability does not affect availability but compromises confidentiality and integrity. The medium CVSS score reflects that while the attack complexity is low, the prerequisite of high privileges limits exploitation scope. However, successful exploitation could facilitate further attacks within the network or site, increasing overall risk.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the use of the Ultimate Multi Design Video Carousel plugin, especially in multi-site environments. Until an official patch is released, administrators should restrict editor-level access to trusted users only and consider temporarily disabling or removing the plugin in multi-site setups. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injections can provide interim protection. Monitoring user activity logs for unusual editor behavior can help detect exploitation attempts. Additionally, enabling Content Security Policy (CSP) headers can mitigate the impact of injected scripts by restricting script execution sources. Developers should update the plugin code to properly sanitize and escape all user inputs and outputs related to the plugin’s data handling. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, organizations should stay alert for official patches or updates from the vendor and apply them promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-22T19:48:19.005Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dfb276c3835a5fbe033c67
Added to database: 10/3/2025, 11:24:38 AM
Last enriched: 2/26/2026, 5:54:53 PM
Last updated: 3/25/2026, 1:35:02 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.