AllInOne – Banner Rotator Vulnerability (Medium) – CVE-2026-28112

AllInOne – Banner Rotator Vulnerability (Medium) – CVE-2026-28112

by | Mar 5, 2026 | Plugins

Attack Vectors

AllInOne – Banner Rotator (slug: all-in-one-bannerRotator) versions up to and including 3.8 are affected by a Medium-severity Reflected Cross-Site Scripting (XSS) issue (CVE-2026-28112, CVSS 6.1). In practical terms, an attacker can craft a malicious link that includes harmful code in a request and send it to someone in your organization.

This attack does not require the attacker to be logged in. However, it typically requires a user interaction step (for example, clicking a link), which makes it well-suited for targeted phishing emails and social messages aimed at marketing teams, executives, finance, or compliance staff who routinely review campaign performance, site content, or administrative pages.

If a targeted user clicks the link, the injected script can run in their browser in the context of your WordPress site, potentially leveraging that user’s trust and any active session they may have.

Security Weakness

The weakness is caused by insufficient input sanitization and output escaping in the plugin. This means the plugin does not consistently treat untrusted input as unsafe before displaying it back to the user, enabling Reflected XSS in affected versions.

Reflected XSS is especially concerning for business teams because it can turn routine activities—like reviewing links, approving content, or responding to vendor/customer messages—into an entry point for web-based manipulation and data exposure.

At the time of this advisory, there is no known patch available. As a result, risk decisions must focus on mitigation, replacement planning, and minimizing exposure consistent with your organization’s risk tolerance.

Technical or Business Impacts

For marketing directors and business owners, the key risk is not “a bug,” but the business impact of a compromised browsing session. If an attacker can get the right person to click, the malicious script can execute in a way that may undermine trust in your site and your brand.

Potential impacts include: brand and customer trust damage if users experience unexpected behavior; campaign disruption if content or settings are manipulated through a victim’s session; data exposure risk depending on what the targeted user can access; and compliance concerns if sensitive information is handled in affected workflows.

Recommended next steps given the lack of a known patch: evaluate whether you can uninstall AllInOne – Banner Rotator and replace it; reduce exposure by limiting who can access relevant pages and by strengthening phishing resistance (since user interaction is required); and review internal processes for handling suspicious links shared via email or chat.

Similar Attacks

Reflected XSS is a common pattern across web platforms and has been widely documented in real-world incidents and security research. For background and examples, these references may be helpful for non-technical stakeholders:

OWASP: Cross-Site Scripting (XSS)
PortSwigger Web Security Academy: Reflected XSS
Wordfence Advisory Source for this issue

For the official record: CVE-2026-28112.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers