Description
The LottieFiles – Lottie block for Gutenberg plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.0 via the `/wp-json/lottiefiles/v1/settings/` REST API endpoint. This makes it possible for unauthenticated attackers to retrieve the site owner's LottieFiles.com account credentials including their API access token and email address when the 'Share LottieFiles account with other WordPress users' option is enabled.
Published: 2026-01-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Apply Patch
AI Analysis

Impact

The LottieFiles – Lottie block for Gutenberg plugin for WordPress contains a vulnerability that allows unauthenticated users to read sensitive data through the /wp-json/lottiefiles/v1/settings/ REST API endpoint. When the 'Share LottieFiles account with other WordPress users' option is enabled, an attacker can retrieve the site owner's LottieFiles.com account credentials, including the API access token and email address. This flaw is a classic example of a sensitive information exposure (CWE‑200) and gives an attacker access to credentials that could be used to control the owner's LottieFiles account or abuse the API.

Affected Systems

Affected systems include the LottieFiles – Lottie block for Gutenberg plugin for WordPress versions up to and including 3.0.0. Any WordPress site that has installed this plugin and has the sharing option enabled is vulnerable. The vulnerability applies to all installations regardless of user role because the REST endpoint does not enforce authentication.

Risk and Exploitability

Risk assessment indicates a CVSS score of 5.3, indicating a moderate severity. The EPSS score is reported as less than 1%, implying a very low likelihood of exploit at this time. The vulnerability is not listed in the CISA KEV catalog. Because the REST endpoint is publicly accessible, an attacker only needs to know the site's URL and may try to query the endpoint; no additional conditions or privileges are required. Therefore the potential impact is the exposure of user credentials and API tokens, but the overall exploit probability remains low.

Generated by OpenCVE AI on April 16, 2026 at 07:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the LottieFiles – Lottie block for Gutenberg plugin to the latest version that removes or secures the API endpoint.
  • Disable the 'Share LottieFiles account with other WordPress users' setting in the plugin’s configuration to prevent credential leakage.
  • If an update is not immediately available, block or require authentication for the /wp-json/lottiefiles/v1/settings/ endpoint using a security plugin or web server rule.

Generated by OpenCVE AI on April 16, 2026 at 07:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
References

Wed, 14 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 14 Jan 2026 05:45:00 +0000

Type Values Removed Values Added
Description The LottieFiles – Lottie block for Gutenberg plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.0 via the `/wp-json/lottiefiles/v1/settings/` REST API endpoint. This makes it possible for unauthenticated attackers to retrieve the site owner's LottieFiles.com account credentials including their API access token and email address when the 'Share LottieFiles account with other WordPress users' option is enabled.
Title LottieFiles – Lottie block for Gutenberg <= 3.0.0 - Unauthenticated Sensitive Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:37:55.879Z

Reserved: 2026-01-08T11:59:20.274Z

Link: CVE-2026-0717

cve-icon Vulnrichment

Updated: 2026-01-14T15:45:05.785Z

cve-icon NVD

Status : Deferred

Published: 2026-01-14T06:15:55.670

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0717

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:00:11Z

Weaknesses