CVE-2025-48349
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in origincode Video Gallery – Vimeo and YouTube Gallery smart-grid-gallery allows Stored XSS.This issue affects Video Gallery – Vimeo and YouTube Gallery: from n/a through <= 1.1.7.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Video Gallery – Vimeo and YouTube Gallery plugin (≤1.1.7) allows attackers with contributor-level access to inject malicious scripts.
Vulnerability
Overview
The Video Gallery – Vimeo and YouTube Gallery plugin (smart-grid-gallery) for WordPress contains a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation. The flaw affects all versions up to and including 1.1.7. An authenticated attacker with contributor privileges or higher can inject arbitrary HTML and JavaScript into gallery content, which is then stored on the server and executed in the browsers of other users when they view the affected pages [1].
Exploitation
Requirements
Exploitation requires a WordPress user account with at least contributor-level permissions to create or edit gallery items. No unusual network access is needed; the attack is carried out through the plugin's administrative interface. The injected payload becomes persistent, meaning every visitor to the page—including site administrators and end-users—will execute the script. User interaction is required only in the sense that a victim must visit the infected page; no additional clicks or form submissions are needed [1].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can be used to steal session cookies, deface the website, redirect visitors to malicious sites, or inject advertisements and phishing overlays. Because it is stored, the attack can propagate to many users over time, making it suitable for mass-exploitation campaigns targeting thousands of WordPress sites [1].
Mitigation
The vendor has not released a patched version as of the publication date. Users should immediately update the plugin if a security update becomes available, or disable the plugin until a fix is applied. Site administrators can also restrict contributor-level permissions and review gallery content for suspicious code as a temporary workaround [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=1.1.7
- Range: <=1.1.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.