WordPress Plugins: XSS via lightGallery <=2.8.3 (Contributor+ attacks)
CVE-2025-5092 Published on November 20, 2025
Multiple Plugins and Themes <= (Various Versions) - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via lightGallery JavaScript Library
Multiple plugins and/or themes for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled lightGallery library (<= 2.8.3) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Timeline
Vendor Notified
Disclosed 161 days later.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2025-5092 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2025-5092
Want to know whenever a new CVE is published for WordPress? stack.watch will email you.
Affected Versions
lightgalleryteam LightGallery WP:- Version *, <= 1.0.5 is affected.
- Version *, <= 1.1.9 is affected.
- Version *, <= 1.2.5.1 is affected.
- Version *, <= 1.7.1031 is affected.
- Version *, <= 2.2.1 is affected.
- Version *, <= 2.3.16 is affected.
- Version *, <= 7.8 is affected.
- Version *, <= 9.10.5 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.