Slidorion Vulnerability (Medium) – CVE-2026-2282

Slidorion Vulnerability (Medium) – CVE-2026-2282

by | Feb 18, 2026 | Plugins

Attack Vectors

The Slidorion WordPress plugin (slug: slidorion) is affected by a Medium-severity vulnerability (CVE-2026-2282, CVSS 4.4) in versions 1.0.2 and below. The issue is an authenticated Stored Cross-Site Scripting (XSS) risk that occurs through Slidorion’s admin settings.

This attack path requires an authenticated user with Administrator-level permissions (or higher). An attacker who can access those settings could inject malicious script content that is then stored and later executed when a user views the affected page or area where the stored content is displayed.

Importantly, this vulnerability only affects (1) WordPress multisite installations and (2) sites where unfiltered_html has been disabled. If your organization operates multiple sites under one WordPress network, or has tightened content controls for compliance reasons, this condition may apply.

Security Weakness

The root cause is insufficient input sanitization and output escaping in Slidorion’s settings handling. In practical terms, the plugin does not adequately validate or safely display certain administrator-provided settings values, allowing script content to be stored and executed later in a user’s browser.

Although this is not a “drive-by” issue—because it requires high privileges—it still represents a meaningful business risk. Real-world scenarios include compromised admin accounts, insider threat situations, or overly broad admin access granted to third parties or agencies.

Technical or Business Impacts

Stored XSS can undermine trust and create compliance exposure because it executes in the context of your site. Depending on where the injected content appears and who views it, business impacts may include unauthorized actions performed in a user’s session, reputational harm, and potential data exposure through browser-based manipulation.

For leadership teams (CEO, COO, CFO) and compliance stakeholders, the risk is often less about “a bug” and more about what it enables: account abuse, tampering with site content, and the possibility of misleading or malicious messaging appearing on branded web properties—especially concerning for regulated industries or publicly visible marketing pages.

No patch is currently known to be available. Based on your organization’s risk tolerance, consider mitigations such as uninstalling Slidorion and replacing it, limiting administrator access, strengthening admin account protections, and reviewing multisite governance and logging for unusual settings changes.

Similar Attacks

Stored XSS in WordPress plugins is a recurring pattern because settings fields and content rendering are common integration points. For background on real-world cases, see examples such as a WordPress plugin stored XSS disclosure impacting contact form workflows (Wordfence: Contact Form 7 stored XSS), a stored XSS issue affecting a popular page builder ecosystem (Wordfence: Elementor Pro vulnerability), and a stored XSS case tied to a widely used file management plugin (Wordfence: WP File Manager vulnerability).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers