CVE-2025-62899
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in THRIVE - Web Design Gold Coast Photospace Responsive photospace-responsive allows Stored XSS.This issue affects Photospace Responsive: from n/a through <= 2.2.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS vulnerability in WordPress Photospace Responsive plugin (<=2.2.0) allows attackers to inject malicious scripts via unneutralized input.
Vulnerability
Overview
CVE-2025-62899 is a stored cross-site scripting (XSS) vulnerability in the Photospace Responsive plugin for WordPress, affecting versions through 2.2.0. The plugin fails to properly neutralize user input during web page generation, allowing malicious users with sufficient privileges to inject arbitrary HTML and JavaScript. This type of vulnerability is often exploited in mass campaigns targeting thousands of websites [1].
Exploitation
Details
Exploitation requires a privileged user (e.g., Contributor or Author) to submit crafted input that is stored on the server. When administrative or other users visit the affected page, the injected script executes in their browsers. No additional user interaction beyond normal page viewing is needed for the stored script to trigger, but the initial injection necessitates a privileged account [1].
Impact
An attacker can inject malicious scripts, such as redirects, advertisements, or other HTML payloads, which execute when any guest visits the site. This can lead to data theft, session hijacking, defacement, or distribution of malware, compromising site integrity and user trust [1].
Mitigation
The vendor has not released a patched version as of the disclosure date. Users are strongly advised to update the plugin immediately if a fix becomes available. As a workaround, consider restricting user roles with posting capabilities or using a web application firewall (WAF) to block malicious payloads. Given that this vulnerability is suitable for mass exploitation, prompt action is recommended [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=2.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.