VYPR
Medium severity5.9NVD Advisory· Published Oct 27, 2025· Updated Apr 27, 2026

CVE-2025-62899

CVE-2025-62899

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in THRIVE - Web Design Gold Coast Photospace Responsive photospace-responsive allows Stored XSS.This issue affects Photospace Responsive: from n/a through <= 2.2.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in WordPress Photospace Responsive plugin (<=2.2.0) allows attackers to inject malicious scripts via unneutralized input.

Vulnerability

Overview

CVE-2025-62899 is a stored cross-site scripting (XSS) vulnerability in the Photospace Responsive plugin for WordPress, affecting versions through 2.2.0. The plugin fails to properly neutralize user input during web page generation, allowing malicious users with sufficient privileges to inject arbitrary HTML and JavaScript. This type of vulnerability is often exploited in mass campaigns targeting thousands of websites [1].

Exploitation

Details

Exploitation requires a privileged user (e.g., Contributor or Author) to submit crafted input that is stored on the server. When administrative or other users visit the affected page, the injected script executes in their browsers. No additional user interaction beyond normal page viewing is needed for the stored script to trigger, but the initial injection necessitates a privileged account [1].

Impact

An attacker can inject malicious scripts, such as redirects, advertisements, or other HTML payloads, which execute when any guest visits the site. This can lead to data theft, session hijacking, defacement, or distribution of malware, compromising site integrity and user trust [1].

Mitigation

The vendor has not released a patched version as of the disclosure date. Users are strongly advised to update the plugin immediately if a fix becomes available. As a workaround, consider restricting user roles with posting capabilities or using a web application firewall (WAF) to block malicious payloads. Given that this vulnerability is suitable for mass exploitation, prompt action is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.