Groups Vulnerability (Medium) – CVE-2026-0549

Groups Vulnerability (Medium) – CVE-2026-0549

by | Feb 18, 2026 | Plugins

Attack Vectors

Groups (slug: groups) versions 3.10.0 and below contain a Medium severity vulnerability (CVSS 6.4, CVE-2026-0549) that can be exploited by an authenticated user with Contributor-level access or higher. The attack uses the plugin’s groups_group_info shortcode by placing malicious script content into user-supplied shortcode attributes.

Because this is a stored cross-site scripting issue, the injected content is saved in WordPress content and then runs later when someone views the affected page. This makes it a realistic risk in environments where multiple teams publish content, manage landing pages, or collaborate with agencies and contractors.

Security Weakness

The issue is caused by insufficient input sanitization and output escaping for user-supplied shortcode attributes in the groups_group_info shortcode. In practical terms, this means the plugin may allow unsafe content to be stored and later rendered to visitors in a way that the browser interprets as executable script.

Even though the attacker must be logged in, marketing and business sites commonly grant Contributor access to support content publishing workflows. That makes this weakness especially relevant for organizations with many editors, distributed teams, or external partners.

Technical or Business Impacts

If exploited, scripts can run in a visitor’s browser whenever they load an injected page. Depending on who views the compromised content (including executives, finance staff, or administrators), this can translate into real business risk: brand damage, altered on-page messaging, and potential exposure of user sessions or sensitive interactions within the site.

For marketing and revenue teams, the most immediate impacts often include loss of trust, campaign disruption, and compromised analytics integrity (e.g., misleading conversions or altered content). For compliance and leadership stakeholders, the risk extends to incident response costs and governance concerns—especially if the site is customer-facing or used in regulated workflows.

Remediation: Update Groups to version 3.11.0 or newer to address this vulnerability.

Similar Attacks

Stored XSS vulnerabilities in WordPress plugins are a recurring issue because content workflows often involve multiple roles and editors. Here are a few real examples of similar attack patterns in the WordPress ecosystem:

CVE-2024-27956 (WordPress Core) — a cross-site scripting issue highlighting how web content handling flaws can create widespread risk when triggered through common workflows.

CVE-2023-2745 (Elementor Website Builder) — an example of a plugin-related XSS vulnerability impacting sites that rely on page-building and content creation features.

CVE-2022-21661 (WordPress Core) — a stored cross-site scripting vulnerability that demonstrates how saved content can become a persistent execution path when not properly handled.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers