First published: Tue Apr 22 2025(Updated: )
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ocean_gallery_id’ parameter in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The Classic Editor plugin must be installed and activated to exploit the vulnerability.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ocean Extra | <=2.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3458 has a moderate severity rating due to its potential for stored cross-site scripting attacks.
To fix CVE-2025-3458, update the Ocean Extra plugin to version 2.4.7 or later.
All users of the Ocean Extra plugin for WordPress running versions up to and including 2.4.6 are affected by CVE-2025-3458.
CVE-2025-3458 is a Stored Cross-Site Scripting (XSS) vulnerability.
Yes, an authenticated user can exploit CVE-2025-3458 due to inadequate input sanitization and output escaping.