Responsive Zoom In/Out Slider WordPress Plugin Vulnerability (Mediu…

Responsive Zoom In/Out Slider WordPress Plugin Vulnerability (Mediu…

by | Mar 5, 2026 | Plugins

Attack Vectors

CVE-2026-28103 is a Medium severity (CVSS 6.1) Reflected Cross-Site Scripting (XSS) issue affecting the Responsive Zoom In/Out Slider WordPress Plugin (slug: lbg_zoominoutslider) in versions up to and including 5.4.5.

The most likely attack path is through a crafted link that contains malicious input. Because this is reflected XSS, the attacker typically needs a user to take an action—most commonly clicking a link—for the injected script to run in that user’s browser.

From a business-risk perspective, this often shows up as targeted phishing campaigns aimed at executives, marketing teams, finance staff, or administrators, where the link appears to be a normal WordPress or campaign-related URL but is designed to trigger script execution if visited.

Security Weakness

According to the published advisory, the Responsive Zoom In/Out Slider WordPress Plugin is vulnerable due to insufficient input sanitization and output escaping. In plain terms, user-supplied data is not being consistently cleaned and safely displayed, which can allow a browser to interpret attacker-controlled content as code.

The CVSS vector indicates no privileges required (PR:N) but user interaction is required (UI:R), meaning the attacker doesn’t need an account on your site, but does need someone to click or load the malicious URL.

Remediation note: The source states there is no known patch available at this time. That elevates the importance of risk-based mitigation decisions, including whether continued use aligns with your organization’s security and compliance requirements.

Technical or Business Impacts

If exploited, reflected XSS can enable an attacker to run scripts in the victim’s browser within the context of your site. Depending on who clicks the link (for example, a site administrator, marketing manager, or finance leader), this can increase the risk of account compromise, unauthorized actions taken in active sessions, or exposure of sensitive information visible to that user.

For marketing directors and executives, the downstream impacts can be significant: brand and customer-trust damage (if visitors perceive the site as unsafe), campaign disruption (website defacements, malicious redirects, or unreliable landing pages), and lead or revenue loss due to reduced conversion and increased bounce rates during an incident.

For compliance and risk teams, an unpatched third-party plugin vulnerability may create audit and vendor-risk concerns, especially if the website supports regulated data flows or serves as a public-facing channel for customer acquisition. Given that no patch is currently known, many organizations will consider uninstalling the affected plugin and replacing it with a supported alternative, or applying compensating controls based on risk tolerance.

Similar Attacks

Reflected XSS is a common web exploitation pattern used in real-world phishing and session-abuse scenarios. Examples of documented XSS vulnerabilities and related exploitation risk include:

CVE-2023-2745 (cvedetails.com) — WordPress plugin XSS example

CVE-2022-21661 (cvedetails.com) — WordPress-related XSS example

CVE-2026-28103 (cve.org) — Official CVE record for this issue

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers