Description
The WP Lightbox 2 WordPress plugin before 3.0.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Published: 2026-03-26
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting by high‑privileged users
Action: Patch
AI Analysis

Impact

The WP Lightbox 2 WordPress plugin before version 3.0.7 fails to sanitise and escape certain configuration settings. When an administrator adds malicious code to those settings, the stored script is later rendered on the settings page and executed, producing a stored cross‑site scripting attack. The vulnerability does not allow arbitrary code execution; it only enables the execution of client‑side scripts in the context of visitors who view the modified settings page.

Affected Systems

Any WordPress site that has WP Lightbox 2 installed in a version older than 3.0.7 is affected. The issue applies regardless of the core WordPress version but requires that the site contains the plugin and that a user with administrative privileges can modify its settings.

Risk and Exploitability

The CVSS score of 4.8 indicates medium severity, and the EPSS score below 1% suggests that exploitation attempts will be uncommon. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated administrator to use the plugin’s settings interface to inject a payload; it typically does not rely on network‑level attacks. Once the malicious script is stored, it can affect any user who navigates to the settings page, leading to potential data theft or session hijacking for those visitors. The known attack vector is therefore an authenticated administrator with the ability to edit the plugin’s settings, potentially inferred from the description.

Generated by OpenCVE AI on March 27, 2026 at 23:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP Lightbox 2 to version 3.0.7 or newer
  • If the patch is unavailable, remove the plugin or restrict administrators from editing its settings
  • Audit existing plugin configuration for unexpected scripts and monitor for changes

Generated by OpenCVE AI on March 27, 2026 at 23:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Thu, 26 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Syedbalkhi
Syedbalkhi wp Lightbox 2
Wordpress
Wordpress wordpress
Vendors & Products Syedbalkhi
Syedbalkhi wp Lightbox 2
Wordpress
Wordpress wordpress

Thu, 26 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
Description The WP Lightbox 2 WordPress plugin before 3.0.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title WP Lightbox 2 < 3.0.7 - Admin+ Stored XSS
References

Subscriptions

Syedbalkhi Wp Lightbox 2
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-03-26T13:34:15.940Z

Reserved: 2026-01-26T09:00:32.008Z

Link: CVE-2026-1430

cve-icon Vulnrichment

Updated: 2026-03-26T13:34:12.683Z

cve-icon NVD

Status : Deferred

Published: 2026-03-26T07:16:19.790

Modified: 2026-04-15T15:05:47.827

Link: CVE-2026-1430

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:27:59Z

Weaknesses