DZS Video Gallery Vulnerability (Medium) – CVE-2025-32300

DZS Video Gallery Vulnerability (Medium) – CVE-2025-32300

by | Feb 26, 2026 | Plugins

Attack Vectors

DZS Video Gallery (WordPress plugin slug: dzs-videogallery) is affected by a Medium-severity vulnerability (CVE-2025-32300, CVSS 6.1) involving Reflected Cross-Site Scripting (XSS) in versions up to and including 12.39.

This issue can be exploited by an unauthenticated attacker by crafting a malicious link that includes injected script content in a request. If a user (for example, a marketing team member, site admin, or other staff) is tricked into clicking the link or otherwise initiating the request, the injected script can execute in their browser in the context of your website.

Because reflected XSS often relies on social engineering (phishing emails, messages sent via contact forms, or links shared through social media/DMs), organizations with many non-technical users and busy approval workflows are especially exposed.

Security Weakness

According to the published advisory, the weakness is caused by insufficient input sanitization and output escaping in the plugin, allowing attacker-supplied input to be reflected back into a page without being safely handled.

In practical terms, the plugin can accept certain values from a request and display them in the browser in a way that allows JavaScript to run. This is why the vulnerability can be triggered by simply getting a user to interact with a crafted link or request, even when the attacker is not logged in.

Remediation: Update DZS Video Gallery to version 12.40 or a newer patched version, as recommended by the vendor/advisory source.

Technical or Business Impacts

While rated Medium, reflected XSS can still create meaningful business risk—especially for marketing and executive stakeholders—because it can be used to manipulate what trusted users see and do inside a browser session. Potential impacts include user redirection to fraudulent pages, content injection that damages brand credibility, and potential exposure of limited sensitive data depending on what a victim can access.

From a business standpoint, the most common consequences include brand and reputation damage (customers or staff seeing altered pages or malicious popups), lead and revenue loss (traffic diverted to scam destinations), and internal account risk if the targeted user has elevated access. This is particularly relevant if marketing administrators, content publishers, or executives frequently access the WordPress dashboard from email links or shared campaign documents.

For reference and tracking, the public CVE record is available here: CVE-2025-32300. The primary advisory source cited is Wordfence: Wordfence Vulnerability Intelligence entry.

Similar Attacks

Reflected XSS is a common web attack pattern and has been observed across many platforms and industries. A few well-documented examples include:

CVE-2018-7600 (Drupal “Drupalgeddon 2”) — widely exploited vulnerabilities affecting Drupal that helped illustrate how web input handling flaws can lead to severe compromise when combined with other conditions.

CVE-2019-11510 (Pulse Secure VPN) — a high-profile case often referenced in incident reporting; while not an XSS issue, it is a reminder that widely deployed web-facing software flaws are rapidly weaponized and frequently used in phishing and targeted campaigns.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers