Description
The AM LottiePlayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via uploaded lottie files in all versions up to, and including, 3.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-01
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS) that can be triggered by authenticated authors or higher who upload lottie files, leading to arbitrary script execution in other users' browsers
Action: Apply Update
AI Analysis

Impact

The AM LottiePlayer plugin for WordPress is vulnerable to stored cross‑site scripting because uploaded lottie files are not properly sanitized or escaped. Authenticated authors or higher can embed arbitrary JavaScript into a lottie file, and the code will execute in the browsers of any user who views a page rendering that file. This could be used for session hijacking, credential theft, or malicious redirection.

Affected Systems

The vulnerability affects the AM LottiePlayer plugin provided by johanaarstein in all releases up to and including version 3.5.3. Any WordPress installation running one of these versions is potentially affected.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity, while the EPSS score of < 1% suggests a low probability of active exploitation at this time. The vulnerability is not listed in CISA KEV. Exploitation requires an authenticated user with Author or higher privileges to upload a malicious lottie file, after which any user who view the affected page will have their browser compromised. The attack vector is likely an authenticated file upload rather than an unauthenticated remote request.

Generated by OpenCVE AI on April 28, 2026 at 02:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an official update from the plugin author and apply it if available
  • If an update is unavailable, immediately deactivate or remove the AM LottiePlayer plugin from your WordPress site
  • Restrict the Author role to the minimum required privileges and prevent lottie file uploads from that role
  • Consider applying a web application firewall rule to detect and block script fragments in uploaded lottie files

Generated by OpenCVE AI on April 28, 2026 at 02:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15120 The AM LottiePlayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via uploaded lottie files in all versions up to, and including, 3.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 01 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 01 May 2025 11:30:00 +0000

Type Values Removed Values Added
Description The AM LottiePlayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via uploaded lottie files in all versions up to, and including, 3.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title AM LottiePlayer <= 3.5.3 - Authenticated (Author+) Stored Cross-Site Scripting via Uploaded Lottie File
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:39.344Z

Reserved: 2025-02-20T23:25:35.481Z

Link: CVE-2025-1529

cve-icon Vulnrichment

Updated: 2025-05-01T13:58:03.460Z

cve-icon NVD

Status : Deferred

Published: 2025-05-01T12:15:16.093

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-1529

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T02:15:18Z

Weaknesses