Search criteria
ⓘ
Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.
2 vulnerabilities found for Multi Video Box by skustes
CVE-2025-2484 (GCVE-0-2025-2484)
Vulnerability from nvd – Published: 2025-03-22 06:41 – Updated: 2025-04-01 16:26
VLAI?
Title
Multi Video Box <= 1.5.2 - Reflected Cross-Site Scripting via video_id and group_id Parameters
Summary
The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'video_id' and 'group_id' parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity ?
6.1 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| skustes | Multi Video Box |
Affected:
* , ≤ 1.5.2
(semver)
|
Credits
Johannes Skamletz
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-2484",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-01T16:26:28.819990Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T16:26:39.590Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Multi Video Box",
"vendor": "skustes",
"versions": [
{
"lessThanOrEqual": "1.5.2",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Johannes Skamletz"
}
],
"descriptions": [
{
"lang": "en",
"value": "The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u0027video_id\u0027 and \u0027group_id\u0027 parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-22T06:41:10.774Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/433e5ba3-c07e-48a1-a28b-781121d892ae?source=cve"
},
{
"url": "https://plugins.trac.wordpress.org/browser/multi-video-box/tags/1.5.2/views/video/get_shortcode.php#L10"
},
{
"url": "https://plugins.trac.wordpress.org/browser/multi-video-box/tags/1.5.2/views/group/get_shortcode.php#L10"
},
{
"url": "https://wordpress.org/plugins/multi-video-box/#developers"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-03-21T17:53:06.000Z",
"value": "Disclosed"
}
],
"title": "Multi Video Box \u003c= 1.5.2 - Reflected Cross-Site Scripting via video_id and group_id Parameters"
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2025-2484",
"datePublished": "2025-03-22T06:41:10.774Z",
"dateReserved": "2025-03-17T23:34:28.561Z",
"dateUpdated": "2025-04-01T16:26:39.590Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-2484 (GCVE-0-2025-2484)
Vulnerability from cvelistv5 – Published: 2025-03-22 06:41 – Updated: 2025-04-01 16:26
VLAI?
Title
Multi Video Box <= 1.5.2 - Reflected Cross-Site Scripting via video_id and group_id Parameters
Summary
The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'video_id' and 'group_id' parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity ?
6.1 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| skustes | Multi Video Box |
Affected:
* , ≤ 1.5.2
(semver)
|
Credits
Johannes Skamletz
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-2484",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-01T16:26:28.819990Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-01T16:26:39.590Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Multi Video Box",
"vendor": "skustes",
"versions": [
{
"lessThanOrEqual": "1.5.2",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Johannes Skamletz"
}
],
"descriptions": [
{
"lang": "en",
"value": "The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u0027video_id\u0027 and \u0027group_id\u0027 parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-22T06:41:10.774Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/433e5ba3-c07e-48a1-a28b-781121d892ae?source=cve"
},
{
"url": "https://plugins.trac.wordpress.org/browser/multi-video-box/tags/1.5.2/views/video/get_shortcode.php#L10"
},
{
"url": "https://plugins.trac.wordpress.org/browser/multi-video-box/tags/1.5.2/views/group/get_shortcode.php#L10"
},
{
"url": "https://wordpress.org/plugins/multi-video-box/#developers"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-03-21T17:53:06.000Z",
"value": "Disclosed"
}
],
"title": "Multi Video Box \u003c= 1.5.2 - Reflected Cross-Site Scripting via video_id and group_id Parameters"
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2025-2484",
"datePublished": "2025-03-22T06:41:10.774Z",
"dateReserved": "2025-03-17T23:34:28.561Z",
"dateUpdated": "2025-04-01T16:26:39.590Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}