VYPR
High severity7.1NVD Advisory· Published Jan 8, 2026· Updated Apr 27, 2026

CVE-2025-27002

CVE-2025-27002

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup CountDown With Image or Video Background countdown-with-background allows Reflected XSS.This issue affects CountDown With Image or Video Background: from n/a through <= 1.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSSRF vulnerability in the WordPress CountDown With Image or Video Background plugin (≤1.5) allows reflected XSS via improper input neutralization.

Vulnerability

Overview

The CountDown With Image or Video Background plugin for WordPress (versions up to and including 1.5) contains a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw enables an attacker to inject arbitrary HTML and JavaScript into the application's response.

Exploitation

Details

Exploitation requires user interaction: a privileged user must click a crafted link, visit a specially prepared page, or submit a malicious form [1]. The attacker does not need prior authentication but relies on tricking an authenticated user into performing the action. The vulnerability-triggering action. The attack surface is the plugin's handling of input parameters that are reflected back without proper sanitization.

Impact

Successful exploitation allows an attacker to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, which execute when other users (including site visitors) access the affected page [1]. This can lead to session hijacking, defacement, or phishing attacks. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of websites [1].

Mitigation

Users should immediately update the plugin to a patched version if available [1]. As a temporary measure, Patchstack has issued a mitigation rule to block attacks until an official patch can be tested and safely applied [1]. If updating is not possible, contacting the hosting provider or a web developer for assistance is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.