Greenshift – animation and page builder blocks Vulnerability (Mediu…

Greenshift – animation and page builder blocks Vulnerability (Mediu…

by | Mar 3, 2026 | Plugins

Attack Vectors

Medium severity (CVSS 5.4) vulnerability CVE-2026-1927 affects the WordPress plugin Greenshift – animation and page builder blocks (slug: greenshift-animation-and-page-builder-blocks) in versions 12.6 and below. The issue can be exploited by an authenticated user with Subscriber-level access or higher.

In practical terms, this means any account that can log in—even a low-privilege account created for a campaign, partner, contractor, or customer community—could potentially be used to access global plugin settings and tamper with them.

Attackers could target sites where user registration is enabled, where accounts are widely distributed across teams, or where credentials are reused or leaked. Because no user interaction is required (per the CVSS vector), this can turn a “small” account compromise into a broader site and brand risk quickly.

Security Weakness

The plugin is vulnerable due to a missing capability (permission) check in the greenshift_app_pass_validation() function, impacting all versions up to and including 12.6. This weakness allows authenticated users without appropriate administrative privileges to retrieve and modify sensitive plugin settings.

According to the published advisory, the exposed data can include stored AI API keys found in global settings. In addition, the attacker may be able to modify settings to inject arbitrary scripts via the custom_css value, resulting in stored cross-site scripting (stored XSS).

The vulnerability was partially patched in 12.6. The recommended remediation is to update to 12.6.1 or newer, where the issue is addressed.

Technical or Business Impacts

Confidentiality exposure: If AI API keys are stored in the plugin’s global settings, attackers with Subscriber access could retrieve them. This can lead to unauthorized use of paid services, unexpected charges, and loss of control over accounts tied to those keys.

Brand and customer trust risk: Stored XSS can allow malicious scripts to run in the browsers of visitors or logged-in staff, potentially enabling content defacement, unauthorized actions performed in a user’s session, or the display of fraudulent messages that damage credibility.

Operational disruption: Because the weakness also allows modification of plugin settings, attackers may change site behavior in ways that degrade page performance, break pages, disrupt conversion paths, or interfere with analytics and campaign landing pages—directly impacting revenue and reporting.

Compliance and governance concerns: Exposure of keys and the potential for script injection can trigger internal incident response, vendor risk review, and regulatory obligations depending on what data is accessed in affected sessions. For compliance teams, this is a meaningful control failure: a low-privilege account should not be able to access sensitive configuration or inject executable content.

Similar Attacks

While every incident differs, authorization gaps and stored XSS are common building blocks in real-world WordPress compromises. Examples of broadly similar attack patterns include:

Elementor Pro (2019) — privilege/authorization-related issue reported by Wordfence

WooCommerce Payments (2023) — exploited vulnerability with significant business impact

Wordfence reporting on recurring plugin vulnerabilities (including XSS classes)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers