Microtango Vulnerability (Medium) – CVE-2026-1821

Microtango Vulnerability (Medium) – CVE-2026-1821

by | Feb 10, 2026 | Plugins

Attack Vectors

Microtango (slug: microtango) versions 0.9.29 and below are affected by a Medium-severity vulnerability (CVSS 6.4) identified as CVE-2026-1821. The issue is an authenticated Stored Cross-Site Scripting (XSS) weakness that can be triggered through shortcode usage.

An attacker with Contributor-level access or higher can inject malicious script code via the restkey parameter of the mt_reservation shortcode. Because this is a stored issue, the injected script can run later when any user views the affected page—potentially including executives, marketing staff, or site administrators.

From a business-risk perspective, this is especially relevant for organizations that accept guest authors, use multiple editorial roles, or have broad access for agencies and contractors. Even if only a small number of accounts can publish or edit content, one compromised Contributor account can become a reliable pathway for abuse.

Security Weakness

The vulnerability stems from insufficient input sanitization and output escaping in Microtango’s handling of shortcode attributes, specifically the restkey parameter used by mt_reservation. This can allow attacker-supplied script content to be saved into a page and later rendered to site visitors.

Because the attack works after authentication (Contributor+), it sits in a common “inside the perimeter” risk zone: it may not be blocked by perimeter controls, and it can be introduced through normal content workflows. In practical terms, this means the threat is not limited to purely external attackers—any compromised user account with the right role can be used to plant the payload.

At the time of this advisory, there is no known patch available. The vendor status may change, but based on the current facts, organizations should plan mitigations according to their risk tolerance, including the possibility of replacing the plugin.

Technical or Business Impacts

Stored XSS issues can translate quickly into business impact because they can affect trusted web pages that customers, partners, and employees routinely visit. If a malicious script executes in a visitor’s browser, it can undermine confidence in your brand experience and disrupt marketing operations.

Potential business impacts include:

Brand and customer trust risk: Pages hosting injected scripts can be used to display fraudulent prompts, redirect users, or alter messaging—damaging credibility and campaign performance.

Account and workflow disruption: If privileged users view an injected page, the attacker may be able to take actions within the browser session context, potentially escalating the incident’s scope depending on what the script is designed to do.

Compliance and governance exposure: For compliance teams, any website compromise involving script injection may raise concerns about customer data handling, third-party risk management, and incident response obligations—especially if the affected pages are public-facing or part of regulated communications.

Operational costs: Investigation, cleanup, and stakeholder communications can consume substantial time, and marketing teams may need to pause or roll back campaigns if key landing pages are affected.

Recommended next steps, given the Medium severity and the absence of a known patch: confirm whether Microtango is installed and in use, identify pages using the mt_reservation shortcode, reduce unnecessary Contributor+ access, review editorial workflows for third-party accounts, and consider uninstalling the affected software and replacing it where feasible.

Similar Attacks

Stored XSS through content features (including shortcodes and editors) is a recurring issue in web platforms and plugins. For context, here are a few real examples of XSS vulnerabilities that have affected widely used WordPress components:

CVE-2019-17671 (WordPress) — a WordPress XSS issue affecting core behavior in certain versions.

CVE-2021-39263 (WordPress) — a WordPress XSS vulnerability that illustrates how script injection weaknesses can arise in common site features.

CVE-2023-2745 (Contact Form 7) — an example of XSS affecting a popular WordPress plugin used across many business websites.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers