Lawyer Directory Vulnerability (High) – CVE-2026-28127

Lawyer Directory Vulnerability (High) – CVE-2026-28127

by | Mar 5, 2026 | Plugins

Attack Vectors

Lawyer Directory (slug: lawyer-directory) versions up to and including 1.3.2 are affected by a High-severity vulnerability (CVSS 7.2) that allows unauthenticated attackers to inject malicious code into content that your site later serves to visitors.

Because this is a stored cross-site scripting (XSS) issue, an attacker can place harmful scripts into pages or entries associated with the plugin, and those scripts can run automatically when a user views the compromised page. This is particularly concerning for sites that rely on trust—such as professional services directories—because the attack can be triggered simply by normal browsing.

Reference: CVE-2026-28127.

Security Weakness

The root cause is insufficient input sanitization and output escaping within Lawyer Directory (through version 1.3.2). In business terms, the plugin is not consistently validating and safely displaying user-supplied content—creating an opening for attackers to store script-based payloads that execute in a victim’s browser.

This vulnerability is classified as Unauthenticated Stored XSS, meaning attackers do not need valid credentials to begin attempting exploitation, and the malicious content can persist on your site until it is removed.

No vendor patch is currently known to be available. Organizations should review details and apply mitigations aligned to risk tolerance; in many cases, uninstalling and replacing the affected plugin may be the safest option.

Technical or Business Impacts

Brand and customer trust risk: A compromised directory page can display misleading content, unauthorized pop-ups, or redirects. For marketing leaders, this can translate to reputational damage, reduced conversion rates, and customer support escalations.

Data exposure and compliance concerns: Stored XSS can be used to capture user interactions and potentially access data visible within a user’s session. This creates potential privacy and compliance implications, especially if staff, partners, or customers routinely interact with affected pages.

Operational disruption: Incident response may require urgent takedowns of pages, emergency site maintenance, and additional monitoring—diverting resources from revenue-generating campaigns and business operations.

Risk context: The vulnerability severity is High (CVSS 7.2; vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), reflecting that it is remotely reachable, requires no authentication, and can impact users across your site’s trust boundary.

Similar Attacks

Stored XSS is a common real-world web risk and has been observed across many platforms and ecosystems. Here are a few well-known examples of cross-site scripting issues to illustrate the broader business impact pattern (site defacement, session risks, and user trust erosion):

Apache Struts XSS advisories (CISA context)
Mozilla security advisory including XSS classes
OWASP: Cross Site Scripting (XSS)

If your organization uses Lawyer Directory <= 1.3.2, treat this as a High business risk: consider removing the plugin, limiting or disabling untrusted submissions, and adding monitoring to detect unauthorized script injection while you evaluate replacement options. Source: Wordfence vulnerability record.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers