Description
The Lightbox & Modal Popup WordPress Plugin – FooBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alternative texts in all versions up to, and including, 2.7.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that allows an authenticated Author level user to inject arbitrary web scripts via image alt text, causing executed malicious JavaScript on user visits
Action: Patch Now
AI Analysis

Impact

The Lightbox & Modal Popup WordPress Plugin – FooBox contains insufficient input sanitization and output escaping in image alternative texts, enabling stored Cross‑Site Scripting. An attacker with Author or higher privileges can inject JavaScript that will execute for any visitor of the infected page, potentially enabling malicious actions in the browsers of those visitors.

Affected Systems

Every WordPress installation that has fooplugins’ Lightbox & Modal Popup WordPress Plugin – FooBox installed, versions 2.7.34 and older. The flaw is present in all releases up to and including 2.7.34 and affects any site that uses the plugin in its default configuration.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity, but the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Though only reachable by users with Author‑level authentication, the payload can be posted to any publicly accessible image alt field, making site‑wide script injection feasible for the compromised account. The attack vector is inferred to be local access via authenticated accounts, which then propagates to visitors of manipulated pages.

Generated by OpenCVE AI on April 21, 2026 at 19:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the FooBox plugin to the latest fixed release (above 2.7.34).
  • Limit Author and higher level user accounts to only those who truly need them, enforce strong, unique passwords, and review account permissions regularly.
  • Remove or disable the plugin if it is not required for site functionality, and audit existing image alt attributes for injected scripts to neutralize any remaining payloads.

Generated by OpenCVE AI on April 21, 2026 at 19:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-20387 The Lightbox & Modal Popup WordPress Plugin – FooBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alternative texts in all versions up to, and including, 2.7.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 10 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Fooplugins
Fooplugins foobox
CPEs cpe:2.3:a:fooplugins:foobox:*:*:*:*:*:wordpress:*:*
Vendors & Products Fooplugins
Fooplugins foobox

Tue, 08 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Jul 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Lightbox & Modal Popup WordPress Plugin – FooBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alternative texts in all versions up to, and including, 2.7.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Lightbox & Modal Popup WordPress Plugin – FooBox <= 2.7.34 - Authenticated (Author+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Fooplugins Foobox
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:18.771Z

Reserved: 2025-06-03T15:28:54.266Z

Link: CVE-2025-5537

cve-icon Vulnrichment

Updated: 2025-07-08T18:10:36.835Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-08T05:15:30.420

Modified: 2025-07-10T13:29:31.597

Link: CVE-2025-5537

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T20:00:25Z

Weaknesses