Omnipress Vulnerability (Medium) – CVE-2026-25432

Omnipress Vulnerability (Medium) – CVE-2026-25432

by | Feb 26, 2026 | Plugins

Attack Vectors

Omnipress (WordPress plugin, slug: omnipress) versions <= 1.6.7 are affected by an authenticated Stored Cross-Site Scripting (XSS) vulnerability tracked as CVE-2026-25432 with Medium severity (CVSS 6.4, vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).

The key business risk is that an attacker only needs a valid WordPress account at the Contributor level (or higher) to inject malicious script content that is then stored in your site and runs automatically when others view the affected page(s). This can be exploited by malicious insiders, compromised contributor accounts, or third parties who gain access through password reuse, phishing, or weak account controls.

Because this is stored XSS, the payload can continue to execute repeatedly for each visitor (including administrators) who loads the injected content, without requiring the victim to click anything unusual.

Security Weakness

According to Wordfence, the vulnerability stems from insufficient input sanitization and output escaping in Omnipress up to and including version 1.6.7. In practical terms, the plugin does not reliably prevent untrusted content from being saved and later displayed in a way that the browser interprets as executable code.

This weakness undermines the trust boundary between “content authors” and “site operators.” Many organizations grant Contributor access broadly (agencies, interns, partners, regional teams). When content tools allow script injection at that permission level, your risk increases significantly—especially for brands with high traffic, customer data workflows, or strict compliance obligations.

Technical or Business Impacts

Stored XSS in a widely used publishing environment can create real downstream business exposure. Potential outcomes include:

Account compromise and privilege escalation: malicious scripts can be used to target logged-in users, including administrators, potentially enabling actions to be performed in their session context.

Brand and customer trust damage: visitors may be redirected, shown fraudulent prompts, or exposed to unwanted content. Even short-lived incidents can lead to reputational harm and reduced campaign performance.

Data exposure and compliance risk: the CVSS vector indicates confidentiality and integrity impacts are possible. If injected scripts interact with sensitive workflows (admin panels, forms, analytics dashboards, customer portals), the incident may trigger internal reporting, legal review, and contractual disclosure requirements.

Operational disruption and remediation cost: incident response often includes emergency content review, log analysis, credential resets, and potentially takedowns or page rollbacks—affecting marketing velocity and site availability.

Remediation status: there is no known patch available at this time. Organizations should consider risk-based mitigations, and in many cases it may be appropriate to uninstall Omnipress and replace it with a supported alternative, as noted in the advisory source (Wordfence entry).

Similar Attacks

Stored XSS issues in WordPress ecosystems are commonly used for admin-session targeting, injected redirects, and persistent site manipulation. Examples of similar real-world vulnerability disclosures include:

CVE-2024-27956 (WordPress plugin stored XSS example)

CVE-2023-2745 (WordPress plugin XSS example)

CVE-2022-21661 (WordPress ecosystem XSS example)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers