Easy Author Image Vulnerability (Medium) – CVE-2026-1373

Easy Author Image Vulnerability (Medium) – CVE-2026-1373

by | Feb 18, 2026 | Plugins

Attack Vectors

Easy Author Image (slug: easy-author-image) is affected by a Medium-severity stored cross-site scripting (XSS) vulnerability (CVSS 6.4; vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) tracked as CVE-2026-1373.

The key business-relevant point: an attacker only needs authenticated access at the Subscriber level (or above) to inject malicious script through the plugin’s profile picture URL field (author_profile_picture_url). Because it’s a stored XSS issue, the malicious content can persist and execute later when others view affected pages.

This can occur in real organizations through common scenarios such as compromised low-privilege accounts, shared credentials, weak password hygiene, or third-party/temporary accounts that were never removed.

Security Weakness

According to the published advisory, the vulnerability exists because versions up to and including 1.7 do not sufficiently sanitize input and escape output for the author_profile_picture_url parameter. That gap allows attackers to store content that a browser later interprets as active script rather than safe text.

While this is sometimes discussed as a “web” issue, the risk is fundamentally a trust and brand protection issue: the site becomes a vehicle for attacker-controlled content, delivered under your organization’s domain and reputation.

Technical or Business Impacts

Customer trust and brand damage: Visitors may be exposed to unwanted pop-ups, redirects, fake forms, or misleading messages that appear to come from your organization. Even a short-lived incident can undermine campaign performance and long-term brand credibility.

Data and account risk: Stored XSS can be used to capture user interactions, manipulate what users see, or abuse authenticated sessions in ways that increase the likelihood of account takeover, unauthorized actions, or exposure of limited data depending on who views the affected pages.

Compliance and legal exposure: If site visitors, customers, or employees are impacted, this can trigger internal incident response, documentation requirements, and potential regulatory or contractual obligations—especially where marketing sites collect leads or process customer information.

Operational disruption and cost: Incident handling often pulls in marketing, IT, legal, and compliance teams. You may need emergency site updates, content reviews, user communications, and forensic support—all of which can delay campaigns and increase cost.

Risk posture note: There is no known patch available for this issue at the time of the advisory. Organizations should evaluate mitigations based on risk tolerance, and it may be best to uninstall the affected plugin and replace it if the function is required.

Similar Attacks

Stored XSS has been repeatedly used in real-world attacks to inject persistent malicious content into websites and administrative interfaces. Examples include:

OWASP: Cross-Site Scripting (XSS) overview and real-world impact patterns

Wordfence blog: documented WordPress plugin vulnerability cases (including XSS)

CISA Cybersecurity Advisories: examples of exploited web application weaknesses

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers