Greenshift – animation and page builder blocks Vulnerability (Mediu…

Greenshift – animation and page builder blocks Vulnerability (Mediu…

by | Mar 5, 2026 | Plugins

Attack Vectors

Greenshift – animation and page builder blocks has a Medium-severity vulnerability (CVE-2026-2593, CVSS 6.4) affecting versions up to and including 12.8.5. The issue is an authenticated Stored Cross-Site Scripting (XSS) weakness, meaning an attacker must first have a WordPress account with at least Contributor access (or higher) to abuse it.

Attackers can inject malicious scripts through the plugin’s handling of the _gspb_post_css post meta value and the dynamicAttributes block attribute. Once planted, the script can run automatically whenever someone visits the affected page—without requiring the visitor to click anything.

Security Weakness

The root cause is insufficient input sanitization and output escaping in the plugin’s processing of certain saved content fields. In plain terms, the plugin does not consistently “clean” potentially dangerous input before storing it, and does not reliably “safely display” it when the page is viewed.

Because it is a stored XSS issue, the malicious code can persist inside your site content until it is removed, increasing business exposure over time—especially on high-traffic landing pages or campaign pages built with these blocks.

Technical or Business Impacts

For leadership and compliance teams, the primary risk is that attackers could run scripts in the browser of site visitors, customers, or employees who view an injected page. This can undermine trust and create downstream security and privacy concerns.

Potential impacts include brand and campaign damage (defacement or unwanted pop-ups), account takeover risk through session or token abuse in the user’s browser context, and loss of integrity of marketing analytics or web forms (for example, redirecting leads or altering on-page content). Depending on who is targeted (customers, partners, internal staff), this can also trigger compliance review, incident response costs, and reputational harm.

Remediation: Update Greenshift – animation and page builder blocks to version 12.8.6 or newer (patched). Also review which users have Contributor+ access, and audit recently edited pages/blocks for unexpected scripts or suspicious changes.

Similar Attacks

Stored XSS in popular web platforms has been repeatedly used to harm brands, hijack accounts, and alter user experiences. Examples include:

CISA Alert: WordPress plugin vulnerability exploited in the wild (2023)

Wordfence reports on WordPress plugin XSS exploitation trends

Imperva overview of XSS attacks and business risk

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers