Love Travel Vulnerability (Medium) –

Love Travel Vulnerability (Medium) –

by | Feb 25, 2026 | Themes

Attack Vectors

The Love Travel WordPress theme (slug: lovetravel) is affected by a Medium-severity reflected cross-site scripting (XSS) and cross-frame scripting issue in versions 2.0 through 3.7 (CVSS 6.1; vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

An unauthenticated attacker could craft a malicious link that includes injected script in one or more request parameters—specifically: keyword, date_from, date_to, price_from_to, nicdark_price_from, and nicdark_price_to. If a user can be persuaded to click the link or otherwise load the affected page (the vulnerability requires user interaction), the injected script may execute in the victim’s browser.

This is most commonly delivered via email, paid ads, social media messages, contact forms, or any channel where a crafted URL can be presented as a legitimate “travel deal,” “booking search,” or “price filter” link.

Security Weakness

The underlying weakness is insufficient input sanitization and output escaping for the listed parameters in Love Travel versions 2.0–3.7. In practical terms, the theme does not adequately neutralize untrusted input before it is reflected back into the page output, enabling attacker-supplied content to be interpreted as script.

No CVE is listed in the provided advisory source for this issue. The vendor-recommended remediation is to update Love Travel to version 3.8 or a newer patched version.

Reference: Wordfence vulnerability advisory.

Technical or Business Impacts

Reflected XSS is often used to compromise trust at the point of customer interaction. For marketing and revenue teams, the immediate risk is brand and conversion damage: visitors may be redirected, shown altered content, or presented with convincing phishing prompts that appear to come from your site.

Potential business impacts include:

  • Brand reputation harm if campaigns drive users to pages that can be manipulated by attacker-crafted links.
  • Lead and revenue loss from disrupted user journeys (search, booking, or inquiry flows) and increased abandonment.
  • Account/session risk in scenarios where executed scripts could access what the browser can access (for example, data visible in the session), depending on how the site and authentication are configured.
  • Compliance and reporting exposure if an incident involves user data handling or requires customer notifications, even when the root cause is “only” scripting.

Recommended action: prioritize updating the Love Travel theme to v3.8+ (or a newer patched release) across production and staging, then retest key landing pages and search/filter pages that use the affected parameters. Consider adding temporary compensating controls such as a reputable WAF rule set and tighter monitoring for unusual query strings in inbound traffic.

Similar attacks (real-world examples): reflected XSS has repeatedly been used to deliver phishing and session-targeting scripts via crafted links. Examples include the British Airways incident involving a web skimming script on their site (overview) and the Magecart-style payment page script attacks seen across multiple brands (RiskIQ research).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers