Address Bar Ads Vulnerability (Medium) – CVE-2026-1795

Address Bar Ads Vulnerability (Medium) – CVE-2026-1795

by | Feb 13, 2026 | Plugins

Attack Vectors

The WordPress plugin Address Bar Ads (versions up to and including 1.0.0) is affected by a Medium-severity vulnerability (CVE-2026-1795, CVSS 6.1) that enables reflected cross-site scripting (XSS) through the URL path.

In practical terms, an unauthenticated attacker can craft a link that contains malicious script content in the URL. If a user can be persuaded to click the link or otherwise follow it (for example through a phishing email, a direct message, a spoofed ad, or a social media post), the injected script can execute in that user’s browser within the context of your site.

Because this requires user interaction (the user must follow the attacker-controlled link), marketing teams and executives should view it as a realistic “social engineering + website” risk, especially during campaigns when links are widely shared and brand trust is leveraged.

Security Weakness

The weakness is caused by insufficient input sanitization and output escaping when handling the URL path. This allows attacker-supplied content to be reflected back into a page in a way that the browser interprets as executable script.

According to the published advisory, the issue affects all versions up to 1.0.0 of Address Bar Ads. There is no known patch available at this time. Details are tracked under CVE-2026-1795 and the source advisory at Wordfence.

When no vendor fix exists, the risk decision becomes a governance issue: determine whether continuing to run the plugin aligns with your organization’s risk tolerance, compliance obligations, and incident response readiness.

Technical or Business Impacts

If exploited, reflected XSS can lead to business-impacting outcomes such as: unauthorized actions performed in a victim’s session, exposure of data visible to that user, manipulation of on-page content, or redirection to fraudulent pages. These outcomes depend on what the user can access and what the attacker attempts to achieve.

For marketing and executive stakeholders, the most important risk is trust and brand damage. A compromised browsing experience on your official site can undermine campaign performance, reduce conversion rates, and create reputational fallout—particularly if users are redirected or see altered content.

There are also potential compliance and reporting implications if the incident involves customer or employee data exposure, even at a limited scope. Legal, compliance, and finance teams may need to assess notification obligations, contractual requirements, and downstream costs (forensics, communications, and remediation).

With no known patch available, consider mitigations that match your risk tolerance. Many organizations will choose to uninstall Address Bar Ads and replace it with a safer alternative, while also increasing monitoring for suspicious links and unusual site behavior during the transition.

Similar Attacks

Reflected XSS has been repeatedly used in real-world incidents to hijack user sessions, inject deceptive content, or redirect visitors to malicious destinations. Examples include:

OWASP: Cross-Site Scripting (XSS) (overview of how XSS is abused and why it matters for organizations).

Cloudflare Learning Center: Cross-Site Scripting (XSS) (business-focused explanation of impacts and common abuse patterns).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers