Vulnerability Description
Multiple plugins and/or themes for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled lightGallery library (<= 2.8.3) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/sachinchoolur/lightGallery
- https://plugins.trac.wordpress.org/changeset/3311382/
- https://plugins.trac.wordpress.org/changeset/3343557/
- https://plugins.trac.wordpress.org/changeset/3356089/
- https://plugins.trac.wordpress.org/changeset/3372141/
- https://themes.trac.wordpress.org/changeset/299860
- https://www.wordfence.com/threat-intel/vulnerabilities/id/acaa3142-2bbc-43d3-8ec
FAQ
What is CVE-2025-5092?
CVE-2025-5092 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Multiple plugins and/or themes for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled lightGallery library (<= 2.8.3) in various versions due to insufficient input saniti...
How severe is CVE-2025-5092?
CVE-2025-5092 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5092?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.