Display During Conditional Shortcode Vulnerability (Medium) – CVE-2…

Display During Conditional Shortcode Vulnerability (Medium) – CVE-2…

by | Feb 17, 2026 | Plugins

Attack Vectors

Display During Conditional Shortcode (slug: display-during-conditional-shortcode) has a Medium-severity vulnerability (CVSS 6.4; CVE-2025-6460) that can be exploited by an authenticated user with Contributor-level access or higher. An attacker can place malicious script content into the plugin’s “message” parameter, which is then stored and later displayed to site visitors.

Because this is a stored cross-site scripting (XSS) issue, the injected content can execute whenever someone loads a page containing the affected shortcode output—potentially impacting internal staff reviewing content (marketing, compliance, leadership) as well as external visitors, depending on where the shortcode is used.

Security Weakness

The root cause is insufficient input sanitization and output escaping for the message parameter in all plugin versions up to and including 1.2. This allows untrusted content entered by a Contributor+ user to be saved and rendered in a way that browsers interpret as executable script.

This matters operationally because “Contributor” access is common in marketing workflows (drafting pages, campaigns, landing content). When a plugin allows script injection at that privilege level, it increases the risk that a compromised contributor account—or a malicious insider—can introduce persistent, hard-to-spot malicious behavior into business-critical pages.

Technical or Business Impacts

For executives and compliance teams, the key risk is not “a technical glitch,” but the potential for loss of trust, data exposure, and brand damage. Stored XSS can be used to alter what visitors see, redirect traffic, capture form entries, or interfere with analytics and tracking—directly impacting campaign performance and decision-making.

Typical impacts include: compromised customer experiences on landing pages, fraudulent lead capture, reputational harm if visitors are redirected or shown unexpected content, and additional compliance exposure if sensitive data is mishandled as a result of compromised site behavior. The risk can extend to internal users as well—if someone with elevated privileges views an injected page, the attacker may gain a pathway to broader control of site functions.

Remediation: Update Display During Conditional Shortcode to version 1.3 or a newer patched version as soon as possible. Source: Wordfence vulnerability record.

Similar Attacks

Stored XSS is a common and repeatedly exploited web attack pattern. Recent, well-documented examples include:

CVE-2021-44223 (WordPress Gutenberg) — a stored XSS issue affecting a widely used content editor component.

CVE-2022-21661 (WordPress Core) — a stored XSS vulnerability addressed in WordPress core security releases.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers