MEDIUM (5.1)
    Plugin

    Stored Cross-Site Scripting in WP Lightbox 2 Plugin

    Published Date: 3/26/2026
    CVE ID: CVE-2026-1430

    Summary

    The WP Lightbox 2 plugin for WordPress, prior to version 3.0.7, contains a vulnerability that allows high privilege users, such as administrators, to inject malicious scripts by not properly sanitizing and escaping certain settings. This can lead to a Stored Cross-Site Scripting (XSS) attack, even when the unfiltered_html capability is restricted, such as in a multisite configuration.

    Vulnerability Details

    The vulnerability in the WP Lightbox 2 plugin before version 3.0.7 arises from the failure of the plugin to adequately sanitize and escape inputs within its settings. In scenarios where the unfiltered_html capability is restricted, like in WordPress multisite environments, this oversight enables administrators to craft input that contains malicious scripts. Once stored, these scripts can be executed in the context of users' browsers when viewing the affected settings page. This poses a significant risk as it can be used to hijack user sessions, deface websites, or carry out further network-based attacks. The issue becomes more pronounced if an organization's trust level with all administrative users is not uniformly high.

    Recommendations

    Administrators should immediately review and restrict settings changes to only those users who absolutely need them, preserving a principle of least privilege. Additionally, they should monitor for any unusual administrative activity and consider deploying a Web Application Firewall (WAF) to filter out suspicious requests.

    Available Fixes

    Last Updated: 3/28/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More