Shortcoder — Create Shortcodes for Anything Vulnerability (Medium) …

Shortcoder — Create Shortcodes for Anything Vulnerability (Medium) …

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2026-27074 is a Medium-severity (CVSS 6.4) Stored Cross-Site Scripting (XSS) vulnerability affecting Shortcoder — Create Shortcodes for Anything (WordPress plugin slug: shortcoder) in versions <= 6.5.1. The issue can be exploited by an authenticated user with Contributor-level access or higher.

Because this is a stored XSS, an attacker can place a malicious script into content managed through the plugin, and that script can execute later when a page is viewed. This makes exploitation realistic in organizations that grant Contributor access to multiple internal users, contractors, agencies, or partners.

Typical business scenarios where this becomes reachable:

  • Multi-author marketing sites where Contributors can draft or publish content.
  • Sites where external agencies have limited WordPress accounts for content updates.
  • Organizations with many plugins and workflows where shortcode content is reused across multiple pages.

Similar attacks (real-world examples): Stored XSS has historically been used to spread “self-propagating” or account-compromising scripts at scale, such as the Samy worm (MySpace) and the Twitter worm.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping in Shortcoder — Create Shortcodes for Anything (through version 6.5.1). In practical terms, the plugin may accept content that includes script-like payloads and later render it to visitors in a way that the browser interprets as active code.

Stored XSS is particularly concerning for business teams because it can affect not just the attacker’s session, but anyone who views the infected page—including executives, site administrators, and customers.

Status: Per the available advisory, there is no known patch at this time. Source: Wordfence vulnerability record. Official CVE record: CVE-2026-27074.

Technical or Business Impacts

If exploited, this vulnerability can enable an attacker to run scripts in the context of your website for users who view compromised pages. From a business-risk perspective, that can translate into:

  • Account compromise (stealing session cookies or forcing actions in a logged-in user’s browser), potentially escalating to admin-level control if an administrator views an infected page.
  • Content and brand damage (unauthorized redirects, defacement-like behavior, or injecting misleading content into landing pages and campaign pages).
  • Lead and revenue loss (malicious scripts can interfere with forms, analytics, attribution, or customer journeys; visitors may be redirected or shown fraudulent prompts).
  • Compliance and privacy exposure (scripts can be used to capture data entered into forms, increasing regulatory and contractual risk depending on what the site collects).

Recommended mitigation (given “no known patch”): evaluate uninstalling or replacing Shortcoder — Create Shortcodes for Anything if it is not business-critical, or temporarily disabling it until a fixed release is available. If removal is not immediately possible, reduce exposure by limiting Contributor access, tightening role permissions, reviewing existing shortcode content for unexpected scripts, and increasing monitoring for unauthorized content changes. These steps do not “fix” the underlying issue, but they can reduce the likelihood and impact of exploitation based on your organization’s risk tolerance.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers