CVE-2025-3745
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-30

Last updated on: 2025-07-01

Assigner: WPScan

Description
The WP Lightbox 2 WordPress plugin before 3.0.6.8 does not correctly sanitize the value of the title attribute of links before using them, which may allow malicious users to conduct XSS attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-30
Last Modified
2025-07-01
Generated
2026-05-07
AI Q&A
2025-06-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
syedbalkhi wp_lightbox_2 to 3.0.6.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-3745 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the WP Lightbox 2 WordPress plugin versions before 3.0.6.8. The plugin does not properly sanitize the value of the title attribute in links before rendering them, allowing attackers to inject malicious JavaScript code. This malicious code is stored and executed when other users view the affected content, potentially leading to unauthorized script execution in their browsers. [1]


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute malicious JavaScript code in the browsers of users who view the affected content. This can lead to unauthorized actions such as stealing session cookies, defacing the website, redirecting users to malicious sites, or performing actions on behalf of the user without their consent. The attack can be triggered by posting a specially crafted link with a malicious title attribute in comments or posts (if the attacker has contributor or author privileges). [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by searching for stored malicious payloads in the title attributes of links within comments or posts on the WordPress site using the WP Lightbox 2 plugin. For example, you can use database queries to look for suspicious HTML tags or JavaScript event handlers in the title attribute. A sample SQL query to detect such payloads in the comments table might be: SELECT * FROM wp_comments WHERE comment_content LIKE '%<a title="%onerror=%'; or scanning the site content for links with suspicious title attributes containing JavaScript code. Additionally, manual inspection or automated scanning tools that detect stored XSS in WordPress plugins can be used. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to update the WP Lightbox 2 plugin to version 3.0.6.8 or later, where the issue has been fixed. Until the update can be applied, restrict user permissions to prevent untrusted users from posting content with links containing malicious title attributes, and consider implementing web application firewall (WAF) rules to block suspicious input patterns related to this XSS vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart