CVE-2025-48922
BaseFortify
Publication date: 2025-06-26
Last updated on: 2025-07-09
Assigner: Drupal.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| levmyshkin | glightbox | to 1.0.16 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-48922 is a Cross-site Scripting (XSS) vulnerability in the GLightbox module for Drupal. It occurs because the module does not properly sanitize user input before passing it to the GLightbox JavaScript library, which can allow attackers to inject malicious scripts. This vulnerability affects GLightbox versions before 1.0.16 and requires the attacker to have a user role with permissions to edit content using the GLightbox module. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with certain user permissions to execute malicious scripts in the context of the affected website. This can lead to unauthorized actions such as stealing user session data, defacing the website, or performing actions on behalf of other users, potentially compromising the security and integrity of the site and its users. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves checking if your Drupal installation uses the GLightbox module version prior to 1.0.16 and whether users with content editing permissions can input content that is not properly sanitized. Since this is a Cross-site Scripting (XSS) vulnerability, you can look for suspicious script injections in content fields that use GLightbox. Specific commands are not provided in the resources, but you can audit your Drupal modules with commands like 'drush pm-list' to check module versions, and review content inputs for malicious scripts. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade the GLightbox module to version 1.0.16 or later, as this version contains the fix for the vulnerability. Additionally, review user roles and permissions to limit who can edit content using the GLightbox module, reducing the risk of exploitation. [1]