Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing With AI, Not Around It: Practical Advanced Techniques For Product Design Use Cases

      August 11, 2025

      Why Companies Are Investing in AI-Powered React.js Development Services in 2025

      August 11, 2025

      The coming AI smartphone: Redefining personal tech

      August 11, 2025

      Modern React animation libraries: Real examples for engaging UIs

      August 11, 2025

      How Debian 13’s little improvements add up to the distro’s surprisingly big leap forward

      August 11, 2025

      Why xAI is giving you ‘limited’ free access to Grok 4

      August 11, 2025

      How Apple may revamp Siri to a voice assistant I’d actually use (and ditch Gemini for)

      August 11, 2025

      I jump-started a bus from the 1930s with this power bank – here’s the verdict

      August 11, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel’s UsePolicy Attribute: Explicit Authorization Control

      August 11, 2025
      Recent

      Laravel’s UsePolicy Attribute: Explicit Authorization Control

      August 11, 2025

      The Laravel Way to Build AI Agents That Actually Work

      August 11, 2025

      The Laravel Way to Build AI Agents That Actually Work

      August 11, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft sued over killing support for Windows 10

      August 11, 2025
      Recent

      Microsoft sued over killing support for Windows 10

      August 11, 2025

      Grok 4 rolled out for free-tier users worldwide, with some limits

      August 11, 2025

      Firefox AI slammed for hogging CPU and draining battery

      August 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-5093 – WordPress Responsive Lightbox & Gallery Stored Cross-Site Scripting Vulnerability

    CVE-2025-5093 – WordPress Responsive Lightbox & Gallery Stored Cross-Site Scripting Vulnerability

    June 27, 2025

    CVE ID : CVE-2025-5093

    Published : June 27, 2025, 6:15 a.m. | 53 minutes ago

    Description : The Responsive Lightbox & Gallery WordPress plugin before 2.5.2 use the Swipebox library which does not validate and escape title attributes before outputting them back in a page/post where used, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-5526 – BuddyPress Docs Information Disclosure Vulnerability
    Next Article CVE-2025-5035 – Firelight Lightbox WordPress Stored Cross-Site Scripting Vulnerability

    Related Posts

    Development

    WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately

    August 11, 2025
    Development

    BadCam Attack Turns Trusted Linux Webcams into Stealthy USB Weapons

    August 11, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-4991 – “3DEXPERIENCE Collaborative Industry Innovator Stored XSS”

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5168 – Assimp Out-of-Bounds Read Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-54448 – Samsung Electronics MagicINFO 9 Server Unrestricted File Upload Code Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Ease My Hotel – All-in-One Hotel Management Software

    Web Development

    Highlights

    CVE-2025-37834 – Linux Kernel: Dirty Swapcache Page Reclamation Vulnerability

    May 8, 2025

    CVE ID : CVE-2025-37834

    Published : May 8, 2025, 7:15 a.m. | 58 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    mm/vmscan: don’t try to reclaim hwpoison folio

    Syzkaller reports a bug as follows:

    Injecting memory failure for pfn 0x18b00e at process virtual address 0x20ffd000
    Memory failure: 0x18b00e: dirty swapcache page still referenced by 2 users
    Memory failure: 0x18b00e: recovery action for dirty swapcache page: Failed
    page: refcount:2 mapcount:0 mapping:0000000000000000 index:0x20ffd pfn:0x18b00e
    memcg:ffff0000dd6d9000
    anon flags: 0x5ffffe00482011(locked|dirty|arch_1|swapbacked|hwpoison|node=0|zone=2|lastcpupid=0xfffff)
    raw: 005ffffe00482011 dead000000000100 dead000000000122 ffff0000e232a7c9
    raw: 0000000000020ffd 0000000000000000 00000002ffffffff ffff0000dd6d9000
    page dumped because: VM_BUG_ON_FOLIO(!folio_test_uptodate(folio))
    ————[ cut here ]————
    kernel BUG at mm/swap_state.c:184!
    Internal error: Oops – BUG: 00000000f2000800 [#1] SMP
    Modules linked in:
    CPU: 0 PID: 60 Comm: kswapd0 Not tainted 6.6.0-gcb097e7de84e #3
    Hardware name: linux,dummy-virt (DT)
    pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=–)
    pc : add_to_swap+0xbc/0x158
    lr : add_to_swap+0xbc/0x158
    sp : ffff800087f37340
    x29: ffff800087f37340 x28: fffffc00052c0380 x27: ffff800087f37780
    x26: ffff800087f37490 x25: ffff800087f37c78 x24: ffff800087f377a0
    x23: ffff800087f37c50 x22: 0000000000000000 x21: fffffc00052c03b4
    x20: 0000000000000000 x19: fffffc00052c0380 x18: 0000000000000000
    x17: 296f696c6f662865 x16: 7461646f7470755f x15: 747365745f6f696c
    x14: 6f6621284f494c4f x13: 0000000000000001 x12: ffff600036d8b97b
    x11: 1fffe00036d8b97a x10: ffff600036d8b97a x9 : dfff800000000000
    x8 : 00009fffc9274686 x7 : ffff0001b6c5cbd3 x6 : 0000000000000001
    x5 : ffff0000c25896c0 x4 : 0000000000000000 x3 : 0000000000000000
    x2 : 0000000000000000 x1 : ffff0000c25896c0 x0 : 0000000000000000
    Call trace:
    add_to_swap+0xbc/0x158
    shrink_folio_list+0x12ac/0x2648
    shrink_inactive_list+0x318/0x948
    shrink_lruvec+0x450/0x720
    shrink_node_memcgs+0x280/0x4a8
    shrink_node+0x128/0x978
    balance_pgdat+0x4f0/0xb20
    kswapd+0x228/0x438
    kthread+0x214/0x230
    ret_from_fork+0x10/0x20

    I can reproduce this issue with the following steps:

    1) When a dirty swapcache page is isolated by reclaim process and the
    page isn’t locked, inject memory failure for the page.
    me_swapcache_dirty() clears uptodate flag and tries to delete from lru,
    but fails. Reclaim process will put the hwpoisoned page back to lru.

    2) The process that maps the hwpoisoned page exits, the page is deleted
    the page will never be freed and will be in the lru forever.

    3) If we trigger a reclaim again and tries to reclaim the page,
    add_to_swap() will trigger VM_BUG_ON_FOLIO due to the uptodate flag is
    cleared.

    To fix it, skip the hwpoisoned page in shrink_folio_list(). Besides, the
    hwpoison folio may not be unmapped by hwpoison_user_mappings() yet, unmap
    it in shrink_folio_list(), otherwise the folio will fail to be unmaped by
    hwpoison_user_mappings() since the folio isn’t in lru list.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Robot, know thyself: New vision-based system teaches machines to understand their bodies

    July 24, 2025

    CVE-2025-34047 – Leadsec SSL VPN Path Traversal Vulnerability

    June 26, 2025

    CVE-2025-4474 – WordPress Frontend Dashboard Plugin Privilege Escalation Vulnerability

    May 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.