CVE-2025-3516

The Simple Lightbox WordPress plugin before 2.9.4 does not validate and escape some of its attributes before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:archetyped:simple_lightbox:*:*:*:*:*:wordpress:*:*

History

22 May 2025, 17:03

Type Values Removed Values Added
First Time Archetyped simple Lightbox
Archetyped
References () https://wpscan.com/vulnerability/336a78cd-297b-4f47-a007-e33eac7f1dad/ - () https://wpscan.com/vulnerability/336a78cd-297b-4f47-a007-e33eac7f1dad/ - Exploit, Third Party Advisory
CWE CWE-79
CPE cpe:2.3:a:archetyped:simple_lightbox:*:*:*:*:*:wordpress:*:*

16 May 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

16 May 2025, 14:42

Type Values Removed Values Added
Summary
  • (es) El complemento Simple Lightbox de WordPress anterior a la versión 2.9.4 no valida ni escapa algunos de sus atributos antes de mostrarlos nuevamente en una página/publicación, lo que podría permitir a los usuarios con rol de colaborador y superior realizar ataques de Cross-Site Scripting almacenado.

16 May 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-16 06:15

Updated : 2025-05-22 17:03


NVD link : CVE-2025-3516

Mitre link : CVE-2025-3516

CVE.ORG link : CVE-2025-3516


JSON object : View

Products Affected

archetyped

  • simple_lightbox
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')