Orbisius Random Name Generator Vulnerability (Medium) – CVE-2026-1893

Orbisius Random Name Generator Vulnerability (Medium) – CVE-2026-1893

by | Feb 10, 2026 | Plugins

Attack Vectors

Orbisius Random Name Generator (slug: orbisius-random-name-generator) versions 1.0.2 and below contain a Medium-severity vulnerability (CVSS 6.4, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) that enables stored cross-site scripting (XSS) when the plugin’s shortcode is used.

The primary attack path involves an authenticated WordPress user with Contributor-level access or higher adding the orbisius_random_name_generator shortcode to content and supplying a malicious value in the btn_label attribute. Because the injected script is stored in site content, it can execute when others view the affected page—potentially including staff, customers, partners, or administrators.

This issue is tracked as CVE-2026-1893 (official record).

Security Weakness

The vulnerability stems from insufficient input sanitization and output escaping for the btn_label attribute within the plugin’s shortcode handling. In business terms, this means untrusted text can be saved and later rendered in a way that the browser interprets as active script rather than plain content.

Because this is a stored issue (not just a one-time link someone must click), it can persist until the affected content is found and cleaned. The “authenticated (Contributor+)” requirement reduces exposure compared to fully public attacks, but it is still a meaningful risk for organizations with multiple authors, agencies, interns, third-party contractors, or any workflow where non-admins can publish or submit content.

Technical or Business Impacts

A successful stored XSS attack can create tangible business risk even when the vulnerability is rated Medium. The injected script runs in a visitor’s browser in the context of your website, which can undermine trust and site integrity.

Potential impacts include:

Brand and customer trust damage: visitors may be redirected, shown unexpected pop-ups, or presented with altered page content—often perceived as a compromised website.

Data and account risk: scripts may attempt to access or misuse what a user’s browser can access while they are on your site, including actions taken in an authenticated session (especially for staff or administrators).

Compliance and reporting exposure: if malicious scripts affect user data collection flows or modify what users see/submit, it can complicate audit trails and raise compliance concerns for regulated organizations.

Operational disruption: incident response time is spent identifying affected pages, removing injected content, and verifying no further persistence remains, potentially impacting marketing campaigns, lead capture, and ecommerce performance.

Remediation: Update Orbisius Random Name Generator to version 1.0.3 or a newer patched release. In parallel, review pages/posts where the orbisius_random_name_generator shortcode is used and confirm the btn_label attribute has not been manipulated.

Similar Attacks

Stored XSS issues have been repeatedly used to deface pages, redirect traffic, and compromise admin sessions across widely used web platforms. Examples of real-world incidents and advisories include:

CISA alerts and KEV catalog updates (illustrates how commonly web vulnerabilities are operationalized and prioritized when exploitation is observed).

Wordfence security research and incident reporting (ongoing documentation of WordPress-focused attacks, including script injection patterns and plugin-related vulnerabilities).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers