Microtango Vulnerability (Medium) – CVE-2026-1821

Microtango Vulnerability (Medium) – CVE-2026-1821

by | Feb 12, 2026 | Plugins

Attack Vectors

Microtango (WordPress plugin) versions up to and including 0.9.29 are affected by CVE-2026-1821, a Medium severity issue (CVSS 6.4) involving stored cross-site scripting (XSS) through shortcode attributes.

The primary attack path requires a user who is already authenticated in WordPress with at least Contributor permissions (or higher). An attacker in that role can place a malicious payload into the restkey parameter of the mt_reservation shortcode. Because the injected script is stored, it can execute later when other users visit the affected page—without requiring them to click anything.

This is most relevant for organizations that allow multiple internal users, agencies, contractors, or partners to create or edit content, or that run multi-author sites where “Contributor+” accounts are common for publishing workflows.

Security Weakness

The weakness is rooted in insufficient input sanitization and output escaping in Microtango’s handling of the mt_reservation shortcode attribute restkey. In plain terms: the plugin does not consistently clean untrusted input before saving it and does not safely display it back to site visitors.

Because the vulnerable behavior occurs in shortcode processing, the issue can be introduced through normal content editing—making it easy to hide within legitimate-looking pages, landing pages, or posts that include reservation-related shortcodes.

For reference, the CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N, indicating a network-reachable issue with low attack complexity, requiring limited privileges, no user interaction, and a scope change.

Technical or Business Impacts

Stored XSS vulnerabilities are business-critical because they can directly undermine trust in your brand and the integrity of your digital channels. With CVE-2026-1821 in Microtango, a malicious script could execute in a visitor’s browser when they view an injected page, which may enable outcomes such as session compromise for logged-in users (including admins), unauthorized actions performed in the background, or stealthy content changes.

From a marketing and executive risk perspective, impacts may include:

Brand and customer trust erosion: visitors may encounter unexpected pop-ups, redirects, or altered page content on high-value pages (e.g., reservations, campaigns, or landing pages), damaging credibility and conversion rates.

Compliance and reporting exposure: if attacker-injected scripts lead to data access or user account compromise, your compliance team may face incident response requirements, partner notifications, or regulatory scrutiny depending on the data involved.

Operational disruption: cleaning injected content, auditing user accounts, and validating site integrity can consume significant internal time and agency budget—especially if multiple pages or templates used the shortcode.

Risk amplifier in multi-user environments: since Contributor-level access is sufficient, organizations relying on distributed content teams, external contributors, or agencies should treat this as a workflow risk as much as a technical one.

Remediation: Update Microtango to version 0.9.30 or a newer patched version. Track this issue under CVE-2026-1821 and validate that pages using the mt_reservation shortcode no longer allow unsafe values in shortcode attributes.

Additional reference: CVE-2026-1821 record and the vendor advisory source at Wordfence Threat Intel.

Similar Attacks

Stored XSS has repeatedly been used to hijack sessions, inject malicious redirects, and compromise administrative accounts on content-managed websites. Real examples include:

Wordfence: Stored XSS vulnerability in WordPress (historical example)

CISA Security Alerts (real-world web exploitation patterns and impacts)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers