salavat counter Plugin Vulnerability (Medium) – CVE-2026-1047

salavat counter Plugin Vulnerability (Medium) – CVE-2026-1047

by | Feb 18, 2026 | Plugins

Attack Vectors

The salavat counter Plugin (slug: salavat-counter) has a Medium-severity vulnerability (CVE-2026-1047, CVSS 4.4) that requires an attacker to already be authenticated with Administrator-level access or higher. In practical terms, this is most relevant when an admin account is compromised (phishing, password reuse, malware on an executive device), when too many people have admin rights “for convenience,” or when a third-party vendor account has elevated permissions.

The issue occurs through the image_url parameter. Because the plugin does not adequately sanitize what is saved and does not properly escape what is later displayed, a malicious admin (or someone who has taken over an admin account) can store harmful script content that will execute when someone later views the affected page or area of the site.

Security Weakness

CVE-2026-1047 is a Stored Cross-Site Scripting (Stored XSS) flaw in the salavat counter Plugin affecting versions 0.9.5 and earlier. “Stored” matters for business risk: the malicious content is saved in your WordPress environment and can repeatedly trigger until it is removed.

According to the published advisory, the root cause is insufficient input sanitization and output escaping related to the image_url parameter. The severity is rated Medium because exploitation requires high privileges and higher complexity, but the impact can extend beyond a single page if it is placed where multiple users will encounter it.

CVE record: CVE-2026-1047 | Source advisory (Wordfence)

Technical or Business Impacts

While this vulnerability requires Administrator+ access, it can still create meaningful business exposure because admin access is exactly what attackers target when they want persistent control over a digital property. Once malicious script is stored, it can be used to manipulate site content, interfere with normal site operations, or collect sensitive information from users who load the affected page.

Potential impacts include brand damage (defaced pages, unwanted pop-ups, malicious redirects), loss of trust (customers and partners seeing suspicious behavior), and regulatory/compliance concerns if personal data is exposed through injected scripts. Marketing and executive teams should also consider downstream impacts such as disrupted campaigns, reduced conversion rates, ad platform policy violations, and costly incident response and communications work.

No patch is currently known. Based on the published remediation guidance, organizations should evaluate risk tolerance and consider uninstalling the affected plugin and replacing it. If immediate removal is not feasible, prioritize compensating controls that reduce the likelihood of admin compromise and limit who can trigger or view affected areas.

Similar Attacks

Stored XSS is a common web application pattern that has repeatedly been used to inject persistent, harmful content into trusted sites. Public examples include cross-site scripting issues disclosed in major platforms and ecosystems:

Drupal “SA-CORE-2018-002” (Drupalgeddon 2) advisory
Jenkins security advisory (2019-01-08) including XSS issues
WordPress security release archive (historical examples)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers