CVE-2026-1430: CWE-79 Cross-Site Scripting (XSS) in WP Lightbox 2
CVE-2026-1430 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability in the WP Lightbox 2 WordPress plugin versions before 3. 0. 7. It arises because certain plugin settings are not properly sanitized or escaped, allowing high privilege users such as administrators to inject malicious scripts. This can occur even when the unfiltered_html capability is disabled, such as in multisite WordPress setups. Exploitation requires authenticated admin-level access and user interaction, but can lead to compromised confidentiality and integrity of site data. No known exploits are currently reported in the wild. Organizations using vulnerable versions of WP Lightbox 2 should update promptly to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-1430 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the WP Lightbox 2 plugin for WordPress, affecting versions prior to 3.0.7. The vulnerability stems from the plugin's failure to properly sanitize and escape certain settings inputs, which are stored and later rendered in the WordPress admin or front-end interface. This flaw allows users with high privileges, such as administrators, to inject malicious JavaScript code that persists within the application. Notably, this vulnerability can be exploited even when the unfiltered_html capability is disabled, a common security restriction in multisite WordPress environments, thereby broadening the attack surface. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and high privileges, with user interaction needed. The impact primarily affects confidentiality and integrity, as the injected scripts could steal sensitive information or manipulate site content. There is no indication of availability impact. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a potential target for attackers aiming to compromise administrative accounts or site integrity. The vulnerability was reserved in January 2026 and published in March 2026, with no patch links provided in the source data, indicating users should verify plugin updates or apply manual mitigations.
Potential Impact
The vulnerability allows high privilege users to inject persistent malicious scripts, which can lead to unauthorized actions such as stealing cookies, session tokens, or performing actions on behalf of administrators. This compromises the confidentiality and integrity of the WordPress site and its data. Although exploitation requires admin-level access, the ability to bypass unfiltered_html restrictions in multisite setups increases risk in complex WordPress environments. Organizations relying on WP Lightbox 2 may face defacement, data leakage, or further pivoting attacks if attackers gain admin credentials. The absence of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks or insider threats. The impact is limited to sites using vulnerable plugin versions and having multiple administrators or editors with elevated privileges.
Mitigation Recommendations
Administrators should immediately update WP Lightbox 2 to version 3.0.7 or later where this vulnerability is fixed. If an update is not immediately possible, restrict administrative access strictly to trusted users and audit user privileges to minimize risk. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections in plugin settings. Regularly review and sanitize all user inputs, especially in plugins that store and render settings. For multisite WordPress installations, consider additional hardening such as disabling unnecessary plugins and enforcing strict content security policies (CSP) to limit script execution. Monitor logs for unusual administrative activity or script injections. Finally, maintain regular backups to enable recovery in case of compromise.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Brazil, Japan, Netherlands
CVE-2026-1430: CWE-79 Cross-Site Scripting (XSS) in WP Lightbox 2
Description
CVE-2026-1430 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability in the WP Lightbox 2 WordPress plugin versions before 3. 0. 7. It arises because certain plugin settings are not properly sanitized or escaped, allowing high privilege users such as administrators to inject malicious scripts. This can occur even when the unfiltered_html capability is disabled, such as in multisite WordPress setups. Exploitation requires authenticated admin-level access and user interaction, but can lead to compromised confidentiality and integrity of site data. No known exploits are currently reported in the wild. Organizations using vulnerable versions of WP Lightbox 2 should update promptly to mitigate risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1430 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the WP Lightbox 2 plugin for WordPress, affecting versions prior to 3.0.7. The vulnerability stems from the plugin's failure to properly sanitize and escape certain settings inputs, which are stored and later rendered in the WordPress admin or front-end interface. This flaw allows users with high privileges, such as administrators, to inject malicious JavaScript code that persists within the application. Notably, this vulnerability can be exploited even when the unfiltered_html capability is disabled, a common security restriction in multisite WordPress environments, thereby broadening the attack surface. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and high privileges, with user interaction needed. The impact primarily affects confidentiality and integrity, as the injected scripts could steal sensitive information or manipulate site content. There is no indication of availability impact. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a potential target for attackers aiming to compromise administrative accounts or site integrity. The vulnerability was reserved in January 2026 and published in March 2026, with no patch links provided in the source data, indicating users should verify plugin updates or apply manual mitigations.
Potential Impact
The vulnerability allows high privilege users to inject persistent malicious scripts, which can lead to unauthorized actions such as stealing cookies, session tokens, or performing actions on behalf of administrators. This compromises the confidentiality and integrity of the WordPress site and its data. Although exploitation requires admin-level access, the ability to bypass unfiltered_html restrictions in multisite setups increases risk in complex WordPress environments. Organizations relying on WP Lightbox 2 may face defacement, data leakage, or further pivoting attacks if attackers gain admin credentials. The absence of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks or insider threats. The impact is limited to sites using vulnerable plugin versions and having multiple administrators or editors with elevated privileges.
Mitigation Recommendations
Administrators should immediately update WP Lightbox 2 to version 3.0.7 or later where this vulnerability is fixed. If an update is not immediately possible, restrict administrative access strictly to trusted users and audit user privileges to minimize risk. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections in plugin settings. Regularly review and sanitize all user inputs, especially in plugins that store and render settings. For multisite WordPress installations, consider additional hardening such as disabling unnecessary plugins and enforcing strict content security policies (CSP) to limit script execution. Monitor logs for unusual administrative activity or script injections. Finally, maintain regular backups to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2026-01-26T09:00:32.008Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c53917f4197a8e3bcae3e2
Added to database: 3/26/2026, 1:48:07 PM
Last enriched: 3/26/2026, 2:03:18 PM
Last updated: 3/26/2026, 3:40:48 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.