InteractiveCalculator for WordPress Vulnerability (Medium) – CVE-20…

InteractiveCalculator for WordPress Vulnerability (Medium) – CVE-20…

by | Feb 17, 2026 | Plugins

Attack Vectors

The InteractiveCalculator for WordPress plugin (slug: interactivecalculator) has a Medium-severity vulnerability (CVSS 6.4; CVE-2026-1807) that can be exploited by an authenticated WordPress user with Contributor-level access or higher. This means the threat can come from inside your organization (a compromised employee account), a third-party agency account, or a vendor account that has been granted content access.

The attack is carried out by placing the plugin’s interactivecalculator shortcode into a post or page and manipulating the id attribute. Because certain user-supplied shortcode attributes are not properly handled, an attacker can inject malicious script that becomes stored within your site content and runs when someone visits the affected page.

Security Weakness

This issue is a stored cross-site scripting (Stored XSS) weakness caused by insufficient input sanitization and output escaping for user-supplied attributes in the interactivecalculator shortcode, specifically via the id attribute, in InteractiveCalculator for WordPress versions 1.0.3 and below.

In business terms: the plugin may allow content-level users to insert code where only normal text or identifiers should be allowed, and that code can execute in visitors’ browsers when the page loads. Even though it requires an authenticated user role (Contributor+), it is still a meaningful risk because marketing and content workflows often involve multiple users and external partners.

Remediation is straightforward: update InteractiveCalculator for WordPress to version 1.0.4 or a newer patched version.

Technical or Business Impacts

For executives, marketing leaders, and compliance teams, the primary concern is trust and exposure. Stored XSS can be used to alter what visitors see, run unauthorized actions in a user’s browser session, or capture information entered into forms on the impacted page—depending on what the attacker injects and which users are affected.

Potential business impacts include brand damage (defaced pages, misleading calls-to-action, or malicious pop-ups), reduced conversion performance (unexpected redirects or broken user journeys), and increased legal or compliance scrutiny if user data is exposed or if the site delivers malicious content to visitors. The risk is elevated for organizations that allow multiple contributors to publish or edit pages, or that work with agencies and contractors who require content access.

From an operational standpoint, incidents like this can also create unplanned downtime for marketing teams (page rollbacks, campaign pauses, emergency reviews of recent content changes) and require additional monitoring and reporting to stakeholders.

Similar Attacks

Stored XSS is a common pattern across web platforms, including WordPress ecosystems. Notable examples include:

CVE-2021-44223 (WordPress: Stored XSS in the Gutenberg editor affecting certain versions).

CVE-2019-17671 (WordPress: Stored XSS issue affecting WordPress core in specific contexts).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers