VYPR
High severity7.1NVD Advisory· Published Jun 27, 2025· Updated Apr 23, 2026

CVE-2025-27361

CVE-2025-27361

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in thhake Photo Express for Google photo-express-for-google allows Reflected XSS.This issue affects Photo Express for Google: from n/a through <= 0.3.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in the Photo Express for Google WordPress plugin (≤0.3.2) allows unauthenticated attackers to inject malicious scripts via improperly neutralized input.

Vulnerability

Description

CVE-2025-27361 is a reflected Cross-Site Scripting (XSS) vulnerability in the Photo Express for Google WordPress plugin, affecting versions from n/a through 0.3.2. The issue arises from improper neutralization of user-supplied input during web page generation, allowing an attacker to inject arbitrary JavaScript or HTML into the response. This class of vulnerability is well-documented and arises when the plugin fails to sanitize or escape parameters before reflecting them back to the user's browser [1].

Exploitation

Exploitation requires user interaction, specifically that a privileged user (e.g., an administrator) clicks a crafted link, visits a specially prepared page, or submits a malicious form. The attacker does not need authentication to craft the exploit payload, but the victim must perform the action. This makes the attack feasible for mass-exploitation campaigns where thousands of WordPress sites running the vulnerable plugin can be targeted simultaneously [1].

Impact

Successful exploitation allows the attacker to execute arbitrary scripts in the context of the victim's browser. This can be leveraged to perform actions such as redirecting visitors to malicious sites, injecting unauthorized advertisements, stealing session tokens, or defacing the website. The CVSS v3 base score of 7.1 (High) reflects the moderate difficulty of exploitation combined with significant potential for harm, particularly in a WordPress environment where XSS can lead to privilege escalation or site takeover [1].

Mitigation

The vendor has released a patched version beyond 0.3.2; users are strongly advised to update the plugin immediately. If updating is not possible, deploying a virtual patch or Web Application Firewall (WAF) rule, such as the one provided by Patchstack, can block exploit attempts until the official fix is applied. Given that this vulnerability is expected to be used in mass-exploit campaigns, immediate action is critical [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.