The Lazy Load for Videos plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its lazy‑loading handlers in all versions up to, and including, 2.18.7 due to insufficient input sanitization and output escaping. The plugin’s JavaScript registration handlers read the client‑supplied 'data-video-title' and 'href' attributes, decode HTML entities by default, and pass them directly into DOM sinks without any escaping or validation. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 27 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 27 Aug 2025 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Kevinweber
Kevinweber lazy Load For Videos
Wordpress
Wordpress wordpress
Vendors & Products Kevinweber
Kevinweber lazy Load For Videos
Wordpress
Wordpress wordpress

Wed, 27 Aug 2025 02:30:00 +0000

Type Values Removed Values Added
Description The Lazy Load for Videos plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its lazy‑loading handlers in all versions up to, and including, 2.18.7 due to insufficient input sanitization and output escaping. The plugin’s JavaScript registration handlers read the client‑supplied 'data-video-title' and 'href' attributes, decode HTML entities by default, and pass them directly into DOM sinks without any escaping or validation. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Lazy Load for Videos <= 2.18.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via data-video-title and href Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-08-27T01:46:48.673Z

Updated: 2025-08-27T14:09:12.900Z

Reserved: 2025-07-16T22:56:22.532Z

Link: CVE-2025-7732

cve-icon Vulnrichment

Updated: 2025-08-27T14:09:10.616Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-27T03:15:38.367

Modified: 2025-08-29T16:22:31.970

Link: CVE-2025-7732

cve-icon Redhat

No data.