Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0717: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in lottiefile LottieFiles – Lottie block for Gutenberg

0
Medium
VulnerabilityCVE-2026-0717cvecve-2026-0717cwe-200
Published: Wed Jan 14 2026 (01/14/2026, 05:28:04 UTC)
Source: CVE Database V5
Vendor/Project: lottiefile
Product: LottieFiles – Lottie block for Gutenberg

Description

CVE-2026-0717 is a medium severity vulnerability in the LottieFiles – Lottie block for Gutenberg WordPress plugin, affecting all versions up to 3. 0. 0. It allows unauthenticated attackers to access sensitive information via the /wp-json/lottiefiles/v1/settings/ REST API endpoint. Specifically, if the 'Share LottieFiles account with other WordPress users' option is enabled, attackers can retrieve the site owner's LottieFiles. com API access token and email address. This exposure can lead to unauthorized use of the LottieFiles account but does not directly impact site integrity or availability. The vulnerability requires no authentication or user interaction and has a CVSS score of 5. 3. There are currently no known exploits in the wild, and no patches have been released yet.

AI-Powered Analysis

AILast updated: 01/14/2026, 06:04:19 UTC

Technical Analysis

CVE-2026-0717 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the LottieFiles – Lottie block for Gutenberg WordPress plugin. This plugin integrates Lottie animations into WordPress sites using Gutenberg blocks. The vulnerability exists in all versions up to and including 3.0.0 and is exploitable via the plugin's REST API endpoint at /wp-json/lottiefiles/v1/settings/. When the plugin's 'Share LottieFiles account with other WordPress users' feature is enabled, this endpoint inadvertently exposes sensitive data such as the site owner's LottieFiles.com account email and API access token. The API token is a critical credential that could allow attackers to interact with the LottieFiles service on behalf of the user, potentially leading to unauthorized content manipulation or data leakage. The flaw requires no authentication or user interaction, making it accessible to any remote attacker who can reach the WordPress REST API. The vulnerability does not affect the confidentiality of the WordPress site itself beyond the LottieFiles credentials, nor does it impact site integrity or availability directly. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. No patches or fixes have been published at the time of disclosure, and no active exploitation has been reported. Organizations using this plugin should consider disabling the vulnerable feature or restricting access to the REST API endpoint until a patch is available.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality of LottieFiles account credentials linked to their WordPress sites. Unauthorized access to the API token could allow attackers to misuse the LottieFiles account, potentially injecting malicious animations or extracting proprietary animation data. While this does not directly compromise the WordPress site’s core data or availability, it could lead to reputational damage, especially for organizations relying on Lottie animations for customer-facing content. Additionally, if attackers leverage the exposed credentials to conduct further attacks or phishing campaigns, it could escalate the impact. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if sensitive account information is leaked. The vulnerability's ease of exploitation and lack of authentication requirements increase the likelihood of opportunistic attacks, particularly against high-profile or high-traffic websites using this plugin. However, the absence of known exploits in the wild and the medium severity rating suggest the immediate risk is moderate but should not be ignored.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, audit all WordPress sites using the LottieFiles – Lottie block for Gutenberg plugin to identify affected versions (up to 3.0.0). If the 'Share LottieFiles account with other WordPress users' option is enabled, consider disabling this feature until a patch is released. Restrict access to the WordPress REST API endpoint /wp-json/lottiefiles/v1/settings/ by implementing IP whitelisting or authentication proxies to prevent unauthenticated external access. Monitor web server logs for unusual requests to this endpoint that could indicate exploitation attempts. Rotate the LottieFiles API access tokens immediately if exposure is suspected or confirmed. Engage with the plugin vendor or monitor official channels for security updates and apply patches promptly once available. Additionally, implement web application firewalls (WAFs) with custom rules to block suspicious API calls targeting this endpoint. Educate site administrators about the risks of sharing API credentials across multiple users and enforce the principle of least privilege for plugin configurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-08T11:59:20.274Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e028330e067168f4053

Added to database: 1/14/2026, 5:47:46 AM

Last enriched: 1/14/2026, 6:04:19 AM

Last updated: 1/14/2026, 7:09:00 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats