WP Lightbox 2 is a WordPress plugin designed to add a responsive lightbox overlay effect to images displayed on a website. The plugin automatically enables lightbox functionality for images and galleries and provides several configuration options, including animation settings, overlay opacity, image information display, and additional descriptive text.

During security testing, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the plugin’s settings panel. The issue allows malicious JavaScript to be injected through the “Additional text below image info” configuration field. Because this value is stored and later rendered on pages where the lightbox is used, the injected script may execute in the browsers of site visitors or administrators.

This vulnerability is tracked as CVE-2026-1430.

CVECVE-2026-1430
Plugin VersionWP Lightbox 2
All Time1 274 366
Active installations30 000+
Publicly PublishedMarch 18, 2026
Last UpdatedMarch 18, 2026
ResearcherArtyom Krugov
PoCYes
ExploitNo
Reference https://www.cve.org/CVERecord?id=CVE-2026-1430
https://wpscan.com/vulnerability/e0536061-140d-47eb-9e8b-9785b52c62f7/
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

January 20, 2026Plugin testing and vulnerability detection in the Wp Lightbox 2 have been completed
January 20, 2026I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
March 18, 2026Registered CVE-2026-1430

Discovery of the Vulnerability

The vulnerability was discovered during analysis of plugin configuration fields that accept user input without sufficient sanitization or output escaping.

The “Additional text below image info” field allows administrators to insert custom text that appears under the image information within the lightbox overlay. However, the plugin does not properly validate or escape this input before rendering it in the HTML output.

As a result, malicious HTML or JavaScript can be stored in the database and executed when the lightbox component is displayed.

Understanding of Stored XSS attack’s

Stored XSS in WooCommerce is particularly dangerous because order views are a privileged workflow surface. Administrators open orders constantly, customer service staff view order details, and order emails can be processed by systems that render HTML. A vulnerability that originates from a checkout field is also attractive to attackers because it can be triggered by a normal purchase flow, sometimes without needing an account at all. Real world outcomes of stored XSS in an order context include stealing admin cookies, forcing background actions using the victim’s session, creating new administrator users, changing payment settings, or installing plugins, depending on what defensive controls are present. The critical lesson here is that safe output encoding must be consistent and one directional. Once you escape, you never decode back into HTML. The moment you do, you have effectively re enabled the attacker’s markup. Allowing event handler attributes like onchange inside wp_kses rules is a strong signal that the allow list is being used incorrectly, because event handlers are code execution primitives in the browser.

Exploiting the Stored XSS Vulnerability

To exploit CVE-2026-1430:

POC:

1)Log in to the WordPress administration panel.
2)Navigate to WP Lightbox 2 → Lightbox General Settings.
3)Locate the Additional text below image info field.
4)Insert the following payload:
"><img src=x onerror=alert(777)>
5) Save the settings.
6) Create or view a page that loads images with the lightbox functionality enabled.

____

When the lightbox is triggered, the injected payload executes in the browser.

Recommendations for Improved Security

To mitigate the risks associated with CVE-2026-1430, administrators should update the WP Lightbox 2 plugin as soon as a patched version becomes available or disable the plugin if no fix has been released. All configuration fields that accept user input, including Additional text below image info, should be properly sanitized before being stored and escaped before being rendered in HTML. Developers should apply WordPress sanitization functions such as sanitize_text_field() when processing input and esc_html() or esc_attr() when outputting data. Implementing strict input validation will help ensure that only expected content types are accepted. Administrators should also limit access to plugin settings to trusted users, regularly audit stored plugin configuration values, and deploy security monitoring solutions such as Web Application Firewalls or security plugins to detect suspicious activity. In addition, applying a strong Content Security Policy (CSP) can reduce the impact of potential XSS attacks by restricting the execution of inline scripts.

By taking proactive measures to address Stored XSS like CVE-2026-1430 WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #Vulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2026-1430 – WP Lightbox 2 Stored XSS

Leave a Reply

Your email address will not be published. Required fields are marked *