CVE-2025-48922
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-26

Last updated on: 2025-07-09

Assigner: Drupal.org

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal GLightbox allows Cross-Site Scripting (XSS).This issue affects GLightbox: from 0.0.0 before 1.0.16.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-26
Last Modified
2025-07-09
Generated
2026-05-07
AI Q&A
2025-06-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
levmyshkin glightbox to 1.0.16 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-48922 is a Cross-site Scripting (XSS) vulnerability in the GLightbox module for Drupal. It occurs because the module does not properly sanitize user input before passing it to the GLightbox JavaScript library, which can allow attackers to inject malicious scripts. This vulnerability affects GLightbox versions before 1.0.16 and requires the attacker to have a user role with permissions to edit content using the GLightbox module. [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker with certain user permissions to execute malicious scripts in the context of the affected website. This can lead to unauthorized actions such as stealing user session data, defacing the website, or performing actions on behalf of other users, potentially compromising the security and integrity of the site and its users. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves checking if your Drupal installation uses the GLightbox module version prior to 1.0.16 and whether users with content editing permissions can input content that is not properly sanitized. Since this is a Cross-site Scripting (XSS) vulnerability, you can look for suspicious script injections in content fields that use GLightbox. Specific commands are not provided in the resources, but you can audit your Drupal modules with commands like 'drush pm-list' to check module versions, and review content inputs for malicious scripts. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the GLightbox module to version 1.0.16 or later, as this version contains the fix for the vulnerability. Additionally, review user roles and permissions to limit who can edit content using the GLightbox module, reducing the risk of exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart