Category Image Vulnerability (Medium) – CVE-2026-0815

Category Image Vulnerability (Medium) – CVE-2026-0815

by | Feb 10, 2026 | Plugins

Attack Vectors

Category Image (slug: category-image) has a Medium severity vulnerability (CVE-2026-0815) that allows authenticated users with Editor-level access or higher to inject malicious scripts into your WordPress site using the ‘tag-image’ parameter.

Because this is a stored cross-site scripting (XSS) issue, the injected script can persist in your site content and execute later when other users view the affected page or area. This increases the risk that non-technical staff, executives, customers, or partners could be exposed simply by browsing the site.

Security Weakness

The weakness is described as insufficient input sanitization and output escaping in Category Image versions up to and including 2.0. In practical terms, this means the plugin may accept unsafe content through the ‘tag-image’ parameter and later display it in a way that allows a browser to run it as code.

Although the required access level is Editor+ (not anonymous), this is still a meaningful business risk because many organizations grant Editor privileges to marketing teams, agencies, or contractors. If any of those accounts are compromised (or misused), an attacker could plant scripts that execute for others.

Technical or Business Impacts

This vulnerability has a CVSS 4.4 (Medium) rating and can lead to real-world outcomes such as content defacement, unauthorized actions performed in a user’s browser session, and misuse of trusted brand pages to deliver deceptive messages. Even when the “technical” impact sounds limited, the reputational and compliance impact can be significant.

For marketing and leadership teams, the biggest risks often include: brand damage from visible injected content, loss of customer trust, potential exposure of sensitive information displayed in the admin experience, and governance issues if an attacker uses your site to run unauthorized scripts against employees or visitors.

Remediation note: There is no known patch available at this time. Based on your risk tolerance, consider removing or replacing the affected plugin, tightening role-based access (especially Editor accounts), and increasing monitoring for unexpected content changes. For official details, reference the CVE record: CVE-2026-0815 and the source advisory: Wordfence vulnerability entry.

Similar Attacks

Stored XSS issues have been used in real incidents to plant persistent malicious scripts on legitimate sites, often for credential theft, redirect campaigns, or injecting unwanted content. Examples:

CISA Alert: 3CX Supply Chain Compromise
CISA Alert: Ivanti Endpoint Manager Mobile (EPMM) Vulnerability Exploited
BleepingComputer: Magecart-style web skimming impacting major sites

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers