CVE-2025-5035

5.4 MEDIUM

📋 TL;DR

The Firelight Lightbox WordPress plugin before version 2.3.16 has a stored cross-site scripting (XSS) vulnerability in title attributes. This allows users with contributor-level permissions or higher to inject malicious scripts that execute when other users view affected pages. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Firelight Lightbox WordPress Plugin
Versions: All versions before 2.3.16
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least contributor-level user access to exploit. WordPress multisite installations are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with contributor access could inject malicious JavaScript that steals administrator credentials, redirects users to malicious sites, or performs actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Contributor-level users could deface pages, display malicious content to visitors, or steal session cookies from other users viewing affected pages.

🟢

If Mitigated

With proper user role management and content review processes, the impact is limited to potential page defacement or minor content manipulation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access or higher. The vulnerability is in title attribute output without proper sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.16

Vendor Advisory: https://wpscan.com/vulnerability/5dca30af-4624-4a71-93be-00fa8dc00c97/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Firelight Lightbox plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.3.16+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily remove contributor role from untrusted users until patch is applied.

Disable Plugin

all

Deactivate the Firelight Lightbox plugin if not essential for site functionality.

🧯 If You Can't Patch

  • Implement strict user role management and review all content from contributor-level users before publishing.
  • Add Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Firelight Lightbox version. If version is below 2.3.16, the site is vulnerable.

Check Version:

wp plugin list --name=firelight-lightbox --field=version

Verify Fix Applied:

Confirm Firelight Lightbox plugin version is 2.3.16 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual content modifications by contributor-level users
  • Multiple failed login attempts followed by successful contributor login

Network Indicators:

  • Unexpected JavaScript in title attributes of lightbox elements
  • External script loading from lightbox content

SIEM Query:

source="wordpress" AND (event="plugin_update" AND plugin="firelight-lightbox" AND version<"2.3.16") OR (event="content_edit" AND user_role="contributor" AND content_contains="<script>")

🔗 References

📤 Share & Export