WP Data Access – No-Code App Builder with Tables, Forms, Charts & M…

WP Data Access – No-Code App Builder with Tables, Forms, Charts & M…

by | Feb 13, 2026 | Plugins

Attack Vectors

CVE-2026-0557 affects the WordPress plugin WP Data Access – No-Code App Builder with Tables, Forms, Charts & Maps (slug: wp-data-access) in versions up to and including 5.5.63. It is a Medium severity issue (CVSS 6.4) involving Stored Cross-Site Scripting (XSS) through the plugin’s wpda_app shortcode.

The primary attack path is through a user who already has access to your WordPress environment at the Contributor level (or higher). By placing malicious content into user-supplied shortcode attributes, an attacker can embed scripts into a page or post. Those scripts can then execute later when others view the affected content—without requiring additional clicks.

Security Weakness

The underlying weakness is insufficient input sanitization and output escaping for user-supplied attributes in the wpda_app shortcode. In practical terms, the plugin does not consistently “clean” and safely render certain shortcode attribute values before they are displayed on a page.

Because this is a stored issue, the malicious content can persist in your site content until it is removed—turning a one-time injection into an ongoing risk. This is especially relevant for organizations that allow multiple internal users, agencies, or freelancers to publish or submit content.

Technical or Business Impacts

Stored XSS can create business risk that goes beyond IT. If exploited, it may enable an attacker to interfere with page content, redirect visitors, or run scripts in a visitor’s browser. This can undermine brand trust and the reliability of analytics and campaign performance reporting.

For leadership and compliance teams, the most relevant outcomes typically include: reputational damage from visible defacement or suspicious behavior, potential exposure of user data accessible through a victim’s session, and increased likelihood of follow-on incidents if compromised accounts are used to expand access. Even at Medium severity, these issues can be disruptive—particularly on high-traffic marketing pages, landing pages, or customer-facing portals.

Remediation: Update WP Data Access to version 5.5.64 or newer patched versions. Track the vulnerability under CVE-2026-0557 (reference: https://www.cve.org/CVERecord?id=CVE-2026-0557). Additional details are available from the original advisory source at Wordfence Threat Intelligence.

Similar Attacks

Stored XSS in WordPress plugins is a common pattern, often involving shortcodes or form inputs where user-controlled content is later displayed to visitors. Here are a few real examples of similar plugin-related XSS issues:

CVE-2019-9978 (Social Warfare plugin) involved a stored XSS vector that could be leveraged to run scripts in site visitors’ browsers.

CVE-2021-25036 (another WordPress plugin stored XSS case) reflects the broader risk category where insufficient sanitization allows persisted script injection.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers