First published: Thu Apr 24 2025(Updated: )
The Lottie Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via File uploads in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the uploaded file.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lottie Player | <=1.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2579 is considered a high severity vulnerability due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2025-2579, update the Lottie Player plugin to version 1.1.9 or later.
Users of the Lottie Player plugin for WordPress up to and including version 1.1.8 are affected by CVE-2025-2579.
CVE-2025-2579 is a Stored Cross-Site Scripting vulnerability.
Authenticated attackers with Author-level access can exploit CVE-2025-2579 to execute malicious scripts in the context of affected users.