FancyBox for WordPress Vulnerability – Authenticated (Admin+) Stored Cross-Site Scripting – CVE-2024-0662 | WordPress Plugin Vulnerability Report

Plugin Name: FancyBox for WordPress

Key Information:

  • Software Type: Plugin
  • Software Slug: fancybox-for-wordpress
  • Software Status: Active
  • Software Author: colorlibplugins
  • Software Downloads: 1,832,612
  • Active Installs: 50,000
  • Last Updated: April 10, 2024
  • Patched Versions: 3.3.4
  • Affected Versions: 3.0.2 - 3.3.3

Vulnerability Details:

  • Name: FancyBox for WordPress 3.0.2 - 3.3.3
  • Title: Authenticated (Admin+) Stored Cross-Site Scripting
  • Type: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-0662
  • CVSS Score: 4.4
  • Publicly Published: April 5, 2024
  • Researcher: Sh
  • Description: FancyBox for WordPress, a popular plugin for displaying images, videos, and more in a lightbox overlay on WordPress sites, has been found to contain a significant security vulnerability in versions 3.0.2 to 3.3.3. This flaw allows attackers with administrative access to inject harmful scripts via the plugin's admin settings due to inadequate input sanitization and output escaping. Particularly concerning is the impact on multi-site installations and sites where the unfiltered_html capability is restricted, creating a potential vector for malicious activities.


The FancyBox for WordPress plugin has been identified as containing a critical vulnerability in versions ranging from 3.0.2 to 3.3.3, where insufficient security measures allow for stored cross-site scripting. This issue has been diligently addressed in the latest version, 3.3.4, effectively mitigating the identified risks.

Detailed Overview:

Discovered by the researcher known as Sh, this vulnerability specifically targets the plugin's admin settings, where the lack of rigorous input validation and output encoding practices opens the door for attackers with admin-level privileges to execute arbitrary scripts. Such scripts could potentially lead to unauthorized access, data leaks, or other malicious outcomes, particularly in environments with heightened security restrictions like multi-site WordPress installations. The timely release of version 3.3.4 by the developers is a critical step in closing this security loophole, reinforcing the plugin's defenses against such exploitation.

Advice for Users:

  • Immediate Action: Users of the FancyBox for WordPress plugin should immediately update to the patched version 3.3.4 to neutralize this vulnerability and protect their sites from potential exploitation.
  • Check for Signs of Vulnerability: Website administrators are advised to review their sites for unusual behavior or unauthorized content changes, which may indicate that the vulnerability has been exploited.
  • Alternate Plugins: Considering the nature of this vulnerability, users may also explore alternative lightbox plugins that offer similar functionalities but with a strong emphasis on security, especially those that are regularly updated and vetted by the WordPress community.
  • Stay Updated: It's imperative to keep all WordPress plugins up-to-date to prevent vulnerabilities and ensure the highest level of security and functionality for your website.


The rapid response from the developers of FancyBox for WordPress in patching this vulnerability highlights the critical importance of continuous vigilance and timely updates in the realm of website security. By ensuring that the latest version, 3.3.4, is installed, users can safeguard their WordPress installations against this and other potential security threats.


Detailed Report: 

In the dynamic realm of the digital world, where WordPress powers a significant portion of the internet, the security of our websites cannot be taken for granted. The discovery of a vulnerability in the widely-used "FancyBox for WordPress" plugin, known as CVE-2024-0662, serves as a crucial reminder of the ever-present need for vigilance in maintaining our online spaces. This vulnerability, which allows for stored cross-site scripting by users with administrative privileges, highlights the delicate balance between functionality and security that website owners must navigate.

About the Plugin:

"FancyBox for WordPress," crafted by colorlibplugins, enhances websites by elegantly displaying images, videos, and HTML content in a lightbox overlay. With over 1.8 million downloads and 50,000 active installations, its impact on the WordPress community is undeniable. The plugin's popularity underscores the potential breadth of this vulnerability's implications.

The Vulnerability:

CVE-2024-0662 exposes a critical flaw in versions 3.0.2 to 3.3.3 of the plugin, where insufficient input sanitization and output escaping make it possible for attackers to inject malicious scripts. This vulnerability is particularly concerning for multi-site installations and sites with restricted unfiltered_html capabilities, posing risks of unauthorized access and data manipulation.

Risks and Potential Impacts:

The exploitation of this vulnerability could lead to significant security breaches, including unauthorized access, data leaks, and potentially severe damage to a website's integrity and its user's trust. Such breaches can tarnish a website's reputation, potentially leading to lost revenue and legal complications for small business owners who rely on their online presence.


In response to this vulnerability, the developers swiftly released an updated version, 3.3.4, that addresses and patches the identified security gap. Users of the "FancyBox for WordPress" plugin are urged to update to this latest version immediately. Regularly monitoring for updates and understanding how to implement them is crucial for maintaining site security.

Previous Vulnerabilities:

This is not the plugin's first encounter with security vulnerabilities; another issue was previously identified and resolved in February 2014. This history of vulnerabilities serves as a reminder of the ongoing challenges faced by plugin developers and the importance of continuous improvement and updates in the cybersecurity landscape.

For small business owners managing WordPress sites, the discovery of CVE-2024-0662 in the "FancyBox for WordPress" plugin underscores the critical need for regular maintenance and updates. Staying informed about vulnerabilities and ensuring that your website's plugins and themes are up-to-date are fundamental practices for safeguarding your digital assets. In a world where time is a precious commodity, leveraging automated update features and working with trusted security partners can help streamline these essential tasks, allowing you to focus on growing your business while maintaining a secure and reliable online presence.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

FancyBox for WordPress Vulnerability – Authenticated (Admin+) Stored Cross-Site Scripting – CVE-2024-0662 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment