CVE-2024-5668: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bradvin Lightbox & Modal Popup WordPress Plugin – FooBox
CVE-2024-5668 is a DOM-based stored Cross-Site Scripting (XSS) vulnerability in the Lightbox & Modal Popup WordPress Plugin – FooBox, affecting all versions up to 2. 7. 28. The flaw arises from insufficient sanitization and escaping of user-supplied HTML data attributes, allowing authenticated users with contributor-level or higher privileges to inject malicious scripts. These scripts execute in the context of any user viewing the compromised page, potentially leading to session hijacking, privilege escalation, or data theft. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. No known public exploits exist yet, but the risk remains significant due to the plugin's widespread use in WordPress sites. Mitigation involves promptly updating the plugin once a patch is available or applying manual input validation and output escaping. Organizations relying on WordPress sites with this plugin should audit user roles and restrict contributor access where possible to reduce risk.
AI Analysis
Technical Summary
CVE-2024-5668 is a medium-severity DOM-based stored Cross-Site Scripting vulnerability identified in the Lightbox & Modal Popup WordPress Plugin – FooBox, maintained by bradvin. The vulnerability affects all plugin versions up to and including 2.7.28. It stems from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and output escaping of HTML data attributes that are user-supplied. Authenticated attackers with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages via these data attributes. Because the malicious script is stored and executed in the browser of any user who visits the infected page, the attack can lead to session hijacking, unauthorized actions on behalf of users, or theft of sensitive information. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates network exploitability with low attack complexity, requiring privileges but no user interaction, and a scope change due to the potential impact on other users. Although no known exploits are currently in the wild, the vulnerability poses a significant risk given the plugin's usage in WordPress environments. The lack of a patch at the time of disclosure necessitates immediate mitigation steps to prevent exploitation.
Potential Impact
The impact of CVE-2024-5668 is primarily on confidentiality and integrity, as attackers can execute arbitrary scripts in the context of other users, potentially stealing session cookies, performing actions on behalf of victims, or defacing content. The vulnerability does not affect availability directly but can lead to reputational damage and loss of user trust. Since exploitation requires contributor-level access, the risk is elevated in environments with weak access controls or compromised user accounts. The scope of affected systems is broad due to the widespread deployment of WordPress and the popularity of the FooBox plugin. Organizations running WordPress sites with this plugin are at risk of targeted attacks, especially those with multiple contributors or less stringent user management. The vulnerability's network exploitability and lack of user interaction requirement increase the likelihood of automated or semi-automated exploitation once a public exploit emerges.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the plugin developer as soon as they become available. 2. In the absence of a patch, implement manual input validation and output escaping for all user-supplied HTML data attributes within the plugin code or via custom filters/hooks in WordPress. 3. Restrict contributor-level and higher privileges to trusted users only, minimizing the number of accounts that can inject content. 4. Conduct regular audits of user roles and permissions to detect and remove unnecessary elevated access. 5. Employ Web Application Firewalls (WAFs) with rules targeting suspicious script injection patterns in HTML attributes. 6. Educate content contributors about the risks of injecting untrusted content and enforce content submission guidelines. 7. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts. 8. Consider disabling or replacing the FooBox plugin with alternatives that have a better security track record until a fix is released.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy
CVE-2024-5668: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bradvin Lightbox & Modal Popup WordPress Plugin – FooBox
Description
CVE-2024-5668 is a DOM-based stored Cross-Site Scripting (XSS) vulnerability in the Lightbox & Modal Popup WordPress Plugin – FooBox, affecting all versions up to 2. 7. 28. The flaw arises from insufficient sanitization and escaping of user-supplied HTML data attributes, allowing authenticated users with contributor-level or higher privileges to inject malicious scripts. These scripts execute in the context of any user viewing the compromised page, potentially leading to session hijacking, privilege escalation, or data theft. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction for exploitation. No known public exploits exist yet, but the risk remains significant due to the plugin's widespread use in WordPress sites. Mitigation involves promptly updating the plugin once a patch is available or applying manual input validation and output escaping. Organizations relying on WordPress sites with this plugin should audit user roles and restrict contributor access where possible to reduce risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-5668 is a medium-severity DOM-based stored Cross-Site Scripting vulnerability identified in the Lightbox & Modal Popup WordPress Plugin – FooBox, maintained by bradvin. The vulnerability affects all plugin versions up to and including 2.7.28. It stems from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient sanitization and output escaping of HTML data attributes that are user-supplied. Authenticated attackers with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages via these data attributes. Because the malicious script is stored and executed in the browser of any user who visits the infected page, the attack can lead to session hijacking, unauthorized actions on behalf of users, or theft of sensitive information. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates network exploitability with low attack complexity, requiring privileges but no user interaction, and a scope change due to the potential impact on other users. Although no known exploits are currently in the wild, the vulnerability poses a significant risk given the plugin's usage in WordPress environments. The lack of a patch at the time of disclosure necessitates immediate mitigation steps to prevent exploitation.
Potential Impact
The impact of CVE-2024-5668 is primarily on confidentiality and integrity, as attackers can execute arbitrary scripts in the context of other users, potentially stealing session cookies, performing actions on behalf of victims, or defacing content. The vulnerability does not affect availability directly but can lead to reputational damage and loss of user trust. Since exploitation requires contributor-level access, the risk is elevated in environments with weak access controls or compromised user accounts. The scope of affected systems is broad due to the widespread deployment of WordPress and the popularity of the FooBox plugin. Organizations running WordPress sites with this plugin are at risk of targeted attacks, especially those with multiple contributors or less stringent user management. The vulnerability's network exploitability and lack of user interaction requirement increase the likelihood of automated or semi-automated exploitation once a public exploit emerges.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the plugin developer as soon as they become available. 2. In the absence of a patch, implement manual input validation and output escaping for all user-supplied HTML data attributes within the plugin code or via custom filters/hooks in WordPress. 3. Restrict contributor-level and higher privileges to trusted users only, minimizing the number of accounts that can inject content. 4. Conduct regular audits of user roles and permissions to detect and remove unnecessary elevated access. 5. Employ Web Application Firewalls (WAFs) with rules targeting suspicious script injection patterns in HTML attributes. 6. Educate content contributors about the risks of injecting untrusted content and enforce content submission guidelines. 7. Monitor website logs and user activity for unusual behavior indicative of exploitation attempts. 8. Consider disabling or replacing the FooBox plugin with alternatives that have a better security track record until a fix is released.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-05T23:27:52.074Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6befb7ef31ef0b55cc6c
Added to database: 2/25/2026, 9:38:55 PM
Last enriched: 2/26/2026, 2:45:47 AM
Last updated: 2/26/2026, 11:39:01 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.