VYPR
Medium severity6.5NVD Advisory· Published Sep 5, 2025· Updated Apr 23, 2026

CVE-2025-58808

CVE-2025-58808

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Babar prettyPhoto prettyphoto allows Stored XSS.This issue affects prettyPhoto: from n/a through <= 1.2.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in the prettyPhoto WordPress plugin (≤1.2.5) allows authenticated attackers to inject persistent malicious scripts.

Vulnerability

Overview

CVE-2025-58808 describes a Stored Cross-Site Scripting vulnerability in the WordPress plugin prettyPhoto, affecting versions through and including 1.2.5. The root cause is improper neutralization of user-supplied input during web page generation, allowing attackers to inject arbitrary JavaScript that gets permanently stored on the server and executed in the browsers of visitors. [1]

Exploitation

Details

To exploit this flaw, an attacker must have a privileged user role—typically a contributor or higher—that allows them to input content processed by the plugin. The stored script is triggered when any user (including administrators) visits the compromised page, without requiring them to click a crafted link. The attack requires user interaction only in the sense that a privileged user must first submit the malicious input. [1]

Impact

Successful exploitation enables an attacker to inject scripts that can steal session cookies, redirect visitors to malicious sites, display unwanted advertisements, or perform other actions within the security context of the victim's browser. Because the payload is stored, every subsequent visitor to the affected page may be impacted. [1]

Mitigation

The vendor has not released a patched version, and users are advised to update the plugin to a fixed version once available. As an immediate workaround, site administrators should disable or remove the prettyPhoto plugin if it is not required, or restrict contributor privileges to trusted users. The vulnerability is listed in the Patchstack database, indicating it may be targeted in automated exploitation campaigns. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.