CVE-2025-3745
BaseFortify
Publication date: 2025-06-30
Last updated on: 2025-07-01
Assigner: WPScan
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| syedbalkhi | wp_lightbox_2 | to 3.0.6.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-3745 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the WP Lightbox 2 WordPress plugin versions before 3.0.6.8. The plugin does not properly sanitize the value of the title attribute in links before rendering them, allowing attackers to inject malicious JavaScript code. This malicious code is stored and executed when other users view the affected content, potentially leading to unauthorized script execution in their browsers. [1]
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute malicious JavaScript code in the browsers of users who view the affected content. This can lead to unauthorized actions such as stealing session cookies, defacing the website, redirecting users to malicious sites, or performing actions on behalf of the user without their consent. The attack can be triggered by posting a specially crafted link with a malicious title attribute in comments or posts (if the attacker has contributor or author privileges). [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by searching for stored malicious payloads in the title attributes of links within comments or posts on the WordPress site using the WP Lightbox 2 plugin. For example, you can use database queries to look for suspicious HTML tags or JavaScript event handlers in the title attribute. A sample SQL query to detect such payloads in the comments table might be: SELECT * FROM wp_comments WHERE comment_content LIKE '%<a title="%onerror=%'; or scanning the site content for links with suspicious title attributes containing JavaScript code. Additionally, manual inspection or automated scanning tools that detect stored XSS in WordPress plugins can be used. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the WP Lightbox 2 plugin to version 3.0.6.8 or later, where the issue has been fixed. Until the update can be applied, restrict user permissions to prevent untrusted users from posting content with links containing malicious title attributes, and consider implementing web application firewall (WAF) rules to block suspicious input patterns related to this XSS vulnerability. [1]