Dealia – Request a quote Vulnerability (Medium) – CVE-2026-2718

Dealia – Request a quote Vulnerability (Medium) – CVE-2026-2718

by | Feb 19, 2026 | Plugins

Attack Vectors

CVE-2026-2718 affects the WordPress plugin Dealia – Request a quote (slug: dealia-request-a-quote) in versions up to and including 1.0.6. This is a Medium severity issue (CVSS 6.4, vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N), meaning it can be reached over the network with low complexity, but it requires a logged-in user with at least Contributor permissions.

The attack path is straightforward in many real-world WordPress environments: an authenticated user with Contributor (or higher) access can add or modify content using Gutenberg blocks and inject malicious script payloads through block attributes. Because the injected code is stored in the page content, it can execute later when other users visit the affected page—without requiring them to click anything unusual.

Security Weakness

This vulnerability is a Stored Cross-Site Scripting (XSS) issue tied to how the plugin outputs Gutenberg block attributes. Specifically, it uses wp_kses() for output escaping in HTML attribute contexts where esc_attr() is required. In business terms, this is an output-handling mistake that can allow untrusted content to be rendered in a way that the browser interprets as active script.

Because it’s stored XSS, the risk isn’t limited to a single user session. Once malicious content is placed on a page, it can impact everyone who views that page—employees, customers, partners, or administrators—depending on where the content is published and who has access to it.

Technical or Business Impacts

For marketing directors and executives, the primary concern is that stored XSS can be used to alter what visitors see and do on your site, or to silently intercept sensitive actions performed in the browser. This can translate into brand risk (defaced pages, malicious pop-ups), campaign risk (tampered landing pages, altered tracking or forms), and trust risk (customers exposed to suspicious behavior on your domain).

Operationally, the requirement for Contributor+ access means the threat model includes compromised contributor accounts, insider misuse, or overly broad user permissions—common realities for organizations running content-heavy sites. With no known patch available, risk decisions become business decisions: limit exposure by reducing contributor access, applying strict editorial workflows, auditing recent content changes, and considering uninstalling Dealia – Request a quote (or replacing it) based on your risk tolerance and compliance obligations.

Similar Attacks

Stored XSS is a recurring issue in web platforms and plugins because it can be triggered during routine page views and can undermine trust quickly. For context, here are a few well-known examples of XSS affecting major sites and ecosystems:

Samy worm (MySpace) — a famous XSS-driven event that spread rapidly through user profiles and demonstrated how quickly browser-based attacks can propagate.

Cross-site scripting examples — background and real-world cases showing how stored and reflected XSS are used to manipulate user sessions and page behavior.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers