CVE-2026-0717: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in lottiefile LottieFiles – Lottie block for Gutenberg
CVE-2026-0717 is a medium severity vulnerability in the LottieFiles – Lottie block for Gutenberg WordPress plugin, affecting all versions up to 3. 0. 0. It allows unauthenticated attackers to access sensitive information via the /wp-json/lottiefiles/v1/settings/ REST API endpoint. Specifically, if the 'Share LottieFiles account with other WordPress users' option is enabled, attackers can retrieve the site owner's LottieFiles. com API token and email address. This exposure can lead to unauthorized use of the LottieFiles account but does not directly impact site integrity or availability. No known exploits are currently reported in the wild. European organizations using this plugin with the vulnerable versions and enabled sharing option are at risk of credential leakage. Mitigation involves disabling the sharing option or updating the plugin once a patch is available.
AI Analysis
Technical Summary
CVE-2026-0717 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the LottieFiles – Lottie block for Gutenberg WordPress plugin. This plugin integrates Lottie animations into WordPress sites. The vulnerability exists in all versions up to and including 3.0.0 and is exploitable via the REST API endpoint /wp-json/lottiefiles/v1/settings/. When the plugin's 'Share LottieFiles account with other WordPress users' feature is enabled, the endpoint inadvertently exposes the site owner's LottieFiles.com account credentials, including the API access token and email address, to unauthenticated users. The API token is a sensitive credential that can allow attackers to perform actions on behalf of the legitimate user within the LottieFiles platform, potentially leading to unauthorized content manipulation or data access. The vulnerability requires no authentication or user interaction, making it accessible to any remote attacker. However, it does not affect the confidentiality, integrity, or availability of the WordPress site itself, only the linked LottieFiles account. No patches or fixes are currently linked, and no active exploitation has been reported. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation but limited scope of impact. This vulnerability highlights the risks of exposing third-party service credentials through WordPress plugins and the importance of secure API endpoint design.
Potential Impact
For European organizations, the exposure of LottieFiles API credentials can lead to unauthorized access to their LottieFiles accounts, which may allow attackers to manipulate or misuse animation assets used on websites or digital marketing materials. While this does not directly compromise the WordPress site’s core security, it can result in reputational damage, unauthorized content changes, or potential leakage of additional linked data within the LottieFiles platform. Organizations relying heavily on Lottie animations for branding or customer engagement may face disruption or misuse of their digital assets. Additionally, if attackers leverage the exposed credentials to conduct further attacks or phishing campaigns targeting the organization’s users or partners, the impact could escalate. The vulnerability’s ease of exploitation and lack of required authentication increase the risk, especially for organizations with multiple WordPress users sharing the LottieFiles account. However, since no known exploits are currently active, the immediate risk is moderate but should be addressed promptly to prevent future abuse.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the LottieFiles – Lottie block for Gutenberg plugin and verify the plugin version. If the version is 3.0.0 or earlier, they should disable the 'Share LottieFiles account with other WordPress users' option to prevent exposure of credentials. Until an official patch is released, restricting access to the /wp-json/lottiefiles/v1/settings/ REST API endpoint via web application firewalls or custom access controls can reduce exposure. Organizations should also rotate their LottieFiles API tokens to invalidate any potentially compromised credentials. Monitoring LottieFiles account activity for unauthorized actions is recommended. Additionally, implementing strict role-based access controls within WordPress to limit who can enable or modify plugin settings can reduce risk. Finally, organizations should subscribe to security advisories from the plugin vendor and apply updates promptly once a fix is available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2026-0717: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in lottiefile LottieFiles – Lottie block for Gutenberg
Description
CVE-2026-0717 is a medium severity vulnerability in the LottieFiles – Lottie block for Gutenberg WordPress plugin, affecting all versions up to 3. 0. 0. It allows unauthenticated attackers to access sensitive information via the /wp-json/lottiefiles/v1/settings/ REST API endpoint. Specifically, if the 'Share LottieFiles account with other WordPress users' option is enabled, attackers can retrieve the site owner's LottieFiles. com API token and email address. This exposure can lead to unauthorized use of the LottieFiles account but does not directly impact site integrity or availability. No known exploits are currently reported in the wild. European organizations using this plugin with the vulnerable versions and enabled sharing option are at risk of credential leakage. Mitigation involves disabling the sharing option or updating the plugin once a patch is available.
AI-Powered Analysis
Technical Analysis
CVE-2026-0717 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the LottieFiles – Lottie block for Gutenberg WordPress plugin. This plugin integrates Lottie animations into WordPress sites. The vulnerability exists in all versions up to and including 3.0.0 and is exploitable via the REST API endpoint /wp-json/lottiefiles/v1/settings/. When the plugin's 'Share LottieFiles account with other WordPress users' feature is enabled, the endpoint inadvertently exposes the site owner's LottieFiles.com account credentials, including the API access token and email address, to unauthenticated users. The API token is a sensitive credential that can allow attackers to perform actions on behalf of the legitimate user within the LottieFiles platform, potentially leading to unauthorized content manipulation or data access. The vulnerability requires no authentication or user interaction, making it accessible to any remote attacker. However, it does not affect the confidentiality, integrity, or availability of the WordPress site itself, only the linked LottieFiles account. No patches or fixes are currently linked, and no active exploitation has been reported. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation but limited scope of impact. This vulnerability highlights the risks of exposing third-party service credentials through WordPress plugins and the importance of secure API endpoint design.
Potential Impact
For European organizations, the exposure of LottieFiles API credentials can lead to unauthorized access to their LottieFiles accounts, which may allow attackers to manipulate or misuse animation assets used on websites or digital marketing materials. While this does not directly compromise the WordPress site’s core security, it can result in reputational damage, unauthorized content changes, or potential leakage of additional linked data within the LottieFiles platform. Organizations relying heavily on Lottie animations for branding or customer engagement may face disruption or misuse of their digital assets. Additionally, if attackers leverage the exposed credentials to conduct further attacks or phishing campaigns targeting the organization’s users or partners, the impact could escalate. The vulnerability’s ease of exploitation and lack of required authentication increase the risk, especially for organizations with multiple WordPress users sharing the LottieFiles account. However, since no known exploits are currently active, the immediate risk is moderate but should be addressed promptly to prevent future abuse.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the LottieFiles – Lottie block for Gutenberg plugin and verify the plugin version. If the version is 3.0.0 or earlier, they should disable the 'Share LottieFiles account with other WordPress users' option to prevent exposure of credentials. Until an official patch is released, restricting access to the /wp-json/lottiefiles/v1/settings/ REST API endpoint via web application firewalls or custom access controls can reduce exposure. Organizations should also rotate their LottieFiles API tokens to invalidate any potentially compromised credentials. Monitoring LottieFiles account activity for unauthorized actions is recommended. Additionally, implementing strict role-based access controls within WordPress to limit who can enable or modify plugin settings can reduce risk. Finally, organizations should subscribe to security advisories from the plugin vendor and apply updates promptly once a fix is available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-08T11:59:20.274Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69672e028330e067168f4053
Added to database: 1/14/2026, 5:47:46 AM
Last enriched: 1/21/2026, 8:47:14 PM
Last updated: 2/7/2026, 12:46:58 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.