CVE-2025-1794
Stored XSS in AM LottiePlayer WordPress Plugin via SVG Upload
Publication date: 2026-04-08
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| am | lottieplayer | to 3.6.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The AM LottiePlayer plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in all versions up to and including 3.6.0. This vulnerability arises because the plugin does not properly sanitize or escape SVG files uploaded by users. As a result, authenticated users with Author-level access or higher can inject malicious web scripts into pages. These scripts execute whenever any user views the infected page.
How can this vulnerability impact me? :
This vulnerability can allow attackers with Author-level access to inject malicious scripts into your website's pages. When other users visit these pages, the injected scripts can execute in their browsers, potentially leading to theft of user credentials, session hijacking, defacement, or distribution of malware. The vulnerability has a CVSS v3.1 base score of 5.4, indicating a moderate severity with impacts on confidentiality and integrity.