Impact
The vulnerability allows an administrator to inject arbitrary JavaScript into the message field of the Multi Functional Flexi Lightbox plugin. When a page or post includes the lightbox, the unsanitized message is rendered, causing the injected script to execute in visitors' browsers. This can lead to credential theft, session hijacking, defacement, or other malicious actions against users of the affected WordPress site.
Affected Systems
The issue affects all installations of the arevico Multi Functional Flexi Lightbox WordPress plugin with version 1.2 or earlier. Any site that has installed or enabled this plugin is susceptible until it is updated or removed.
Risk and Exploitability
The CVSS base score of 5.5 indicates moderate severity, and the vulnerability is not listed in the KEV catalog. Exploitation requires authenticated Administrator access to the WordPress dashboard, so the attack vector is mainly local, but once scripted code is stored it can propagate to all visitors of lightbox pages. Because the exploit can be performed by site admins, the risk to site owners and their users is significant, especially for sites with sensitive information or high traffic.
OpenCVE Enrichment