Stored Cross-Site Scripting Vulnerability in WordPress Plugins via Featherlight.js Library
CVE-2024-5667
6.4MEDIUM
Key Information:
- Vendor
- Cipherdevgroup
- Status
- WP Featherlight – A Simple Jquery Lightbox
- Responsive Lightbox & Gallery
- Vendor
- CVE Published:
- 5 March 2025
Summary
Multiple plugins for WordPress are prone to a Stored Cross-Site Scripting vulnerability. This issue arises from insufficient input sanitization and output escaping for user-supplied attributes within the bundled Featherlight.js JavaScript library (versions 1.7.13 and 1.7.14). Authenticated attackers with contributor-level access and higher can inject arbitrary web scripts into pages. These scripts will execute whenever users visit the compromised pages, posing a significant security risk.
Affected Version(s)
Responsive Lightbox & Gallery * <= 2.4.7
WP Featherlight – A Simple jQuery Lightbox * <= 1.3.4
References
CVSS V3.1
Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Craig Smith