CVE-2025-7725
Photos, · Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress
A high-severity vulnerability exists in a popular multi-purpose WordPress plugin, "Contest Gallery." This flaw allows unauthenticated attackers to inject malicious code into the website's comment sect.
Executive summary
A high-severity vulnerability exists in a popular multi-purpose WordPress plugin, "Contest Gallery." This flaw allows unauthenticated attackers to inject malicious code into the website's comment sections. Successful exploitation could lead to the theft of sensitive user and administrator data, account takeovers, and significant reputational damage to the organization.
Vulnerability
The plugin is vulnerable to Stored Cross-Site Scripting (XSS). An unauthenticated attacker can submit a comment containing a malicious JavaScript payload. Because the plugin fails to properly sanitize user-supplied input before storing it in the database and rendering it on the page, this malicious script is saved. When any user, including a privileged administrator, views the page containing the malicious comment, the script executes within their browser, inheriting their permissions and session context.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.2. A successful attack could have significant business consequences, including the compromise of administrator accounts, which would grant an attacker full control over the affected WordPress site. It could also lead to the theft of session cookies and sensitive data from website visitors, website defacement, or redirection of users to malicious phishing sites. Such an incident would result in a loss of customer trust, direct financial loss, and severe reputational harm.
Remediation
Immediate Action: Immediately update the "Contest Gallery" plugin to a version greater than 26, as recommended by the vendor. If the plugin is not essential for business operations, consider deactivating and uninstalling it to completely remove the associated attack surface.
Proactive Monitoring: Monitor web server and application logs for suspicious POST requests to comment submission forms, specifically looking for payloads containing HTML script tags (<script>, <img>), event handlers (onerror, onload), or other XSS vectors. Monitor for unusual outbound traffic patterns from client browsers that have recently visited the site. Utilize a File Integrity Monitoring (FIM) solution to detect unauthorized changes to plugin files.
Compensating Controls: If patching cannot be performed immediately, deploy a Web Application Firewall (WAF) with a robust ruleset to detect and block XSS attack attempts. Implement a strict Content Security Policy (CSP) to restrict the execution of untrusted inline scripts. As a temporary measure, disable the comment functionality on all pages where the vulnerable plugin is active.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the High severity (CVSS 7.2) and the low attack complexity, which requires no user interaction beyond viewing a page, this vulnerability poses a significant risk. While this CVE is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential for widespread impact is high. We strongly recommend that organizations using the affected plugin prioritize applying the security update immediately. If patching is delayed, the compensating controls outlined above should be implemented without delay to mitigate the risk of website compromise and data theft.