
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
The jQuery Colorbox WordPress plugin through version 4.6.3 contains a Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-3650. The vulnerability exists in the colorbox library implementation, which fails to properly sanitize title attributes on links. This vulnerability was discovered and reported by Pierre Rudloff, with public disclosure on August 22, 2025 (WPScan).
The vulnerability stems from insufficient input validation in the colorbox library used by the WordPress plugin. The issue specifically affects title attributes on links that are processed by the library. The vulnerability has received a CVSS v3.1 Base Score of 3.5 (LOW) with the following vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N. This indicates that while the vulnerability is network-accessible, it requires high privileges and user interaction to exploit (NIST NVD).
When successfully exploited, this vulnerability allows authenticated users with at least contributor-level access to conduct XSS attacks against administrators. The impact is limited to low confidentiality and integrity breaches, with no impact on system availability (WPScan).
Currently, there is no known fix available for this vulnerability in the jQuery Colorbox WordPress plugin. Users should consider implementing additional access controls or temporarily disabling the plugin until a security update is released (WPScan).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"