The LightPress Lightbox WordPress plugin before 2.3.4 does not check download links point to valid, non-Javascript URLs, allowing users with at least the contributor role to conduct Stored XSS attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/37fb7f3b-1766-4c2c-9b78-f77f15a04476/ | Exploit Third Party Advisory |
Configurations
History
05 Jun 2025, 14:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/37fb7f3b-1766-4c2c-9b78-f77f15a04476/ - Exploit, Third Party Advisory | |
First Time |
Lightpress
Lightpress lightbox |
|
CWE | CWE-79 | |
CPE | cpe:2.3:a:lightpress:lightbox:*:*:*:*:*:wordpress:*:* |
12 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
Summary |
|
12 May 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-12 06:15
Updated : 2025-06-05 14:27
NVD link : CVE-2025-3649
Mitre link : CVE-2025-3649
CVE.ORG link : CVE-2025-3649
JSON object : View
Products Affected
lightpress
- lightbox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')