Easy Voice Mail Vulnerability (Medium) – CVE-2026-1164

Easy Voice Mail Vulnerability (Medium) – CVE-2026-1164

by | Feb 13, 2026 | Plugins

Attack Vectors

Easy Voice Mail (WordPress plugin slug: easy-voice-mail) versions 1.2.5 and earlier are affected by a Medium-severity Stored Cross-Site Scripting (XSS) issue tracked as CVE-2026-1164 (CVSS 6.1).

Based on the published details, the primary attack path requires an attacker who already has Administrator-level access (or higher) to the WordPress environment. The attacker can place a malicious script into the “message” field, which can then run later when someone views the impacted page.

This means the risk is often tied to scenarios such as compromised admin accounts, unsafe credential sharing, weak access controls, or untrusted third-party administrators (including agencies, contractors, or inherited accounts after staffing changes).

Security Weakness

The reported root cause is insufficient input sanitization and output escaping for content submitted through the “message” parameter. In practical terms, this allows stored content to include script-like behavior that can execute in a viewer’s browser under certain conditions.

Because this is a stored issue, the malicious content can persist in your site’s content until it is found and removed, increasing the chance of exposure over time—especially if the affected pages are accessed by multiple internal stakeholders or customers.

Note: While the vulnerability is categorized as “unauthenticated stored XSS” in the title, the available details indicate exploitation is possible by authenticated attackers with Administrator-level access and above. Your internal risk assessment should align to that published description.

Technical or Business Impacts

For executive and compliance stakeholders, the business risk is less about the code detail and more about what an attacker could achieve once scripts run in a user’s browser while interacting with your site. Potential outcomes can include session hijacking, unwanted actions performed in a logged-in user’s context, and content or user-experience manipulation that undermines trust.

Operationally, this can translate into brand damage (defaced or misleading pages), higher support burden, lost conversions, and potential compliance concerns if user data exposure occurs through browser-based actions. The CVSS vector (UI:R) also suggests an element of user interaction is required, meaning the impact often depends on who visits the affected page and with what privileges.

Remediation status: There is no known patch available at this time. Organizations should evaluate mitigations based on risk tolerance; for many businesses, the safest path may be to uninstall Easy Voice Mail and replace it with an alternative that is actively maintained. Additionally, tighten administrative access, review admin accounts for compromise, and consider monitoring for unexpected script-like content in stored messages.

Reference: CVE-2026-1164 record and the source advisory at Wordfence Threat Intel.

Similar Attacks

Stored XSS issues in web applications and content platforms are commonly used to run malicious scripts in a visitor’s browser, often to steal sessions, redirect users, or perform actions as the victim. Here are a few well-known, real-world examples of XSS being used at scale:

Samy worm (MySpace) — a classic case where XSS was used to propagate rapidly across user profiles.

Industry overview of XSS impacts and abuse patterns — summarizes how XSS is commonly leveraged to compromise user sessions and trust.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers