UberSlider – Layer Slider WordPress Plugin Vulnerability (Medium) -…

UberSlider – Layer Slider WordPress Plugin Vulnerability (Medium) -…

by | Mar 5, 2026 | Plugins

Attack Vectors

UberSlider PerpetuumMobile (also described as the UberSlider – Layer Slider WordPress Plugin, slug: uberSlider_perpetuummobile) has a Medium-severity vulnerability (CVSS 6.1) identified as CVE-2026-28100. The issue is a Reflected Cross-Site Scripting (XSS) weakness affecting versions 2.3 and below.

In practical terms, an unauthenticated attacker can attempt to deliver a specially crafted link that, when clicked, causes script content to be reflected back and executed in the victim’s browser. This typically relies on social engineering—for example, persuading an employee, contractor, or partner to click a link or take a simple action while logged into the site or while using a trusted browser session.

Security Weakness

The root cause is described as insufficient input sanitization and output escaping in UberSlider PerpetuumMobile (<= 2.3). When a plugin accepts user-controlled input and returns it to the page without properly cleaning it, the browser may interpret that content as executable script.

Because this is a reflected XSS (not stored), the attack generally depends on a user interaction event such as clicking a link. However, for business stakeholders, the key point is that it can still be used to compromise trust in brand-owned web experiences and potentially enable follow-on misuse of authenticated sessions.

Technical or Business Impacts

This vulnerability is rated Medium severity (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N), which aligns with a scenario where an attacker can act remotely, does not need an account, but does need a user to interact. Impacts may include exposure of limited sensitive information and limited unauthorized actions within the context of a user’s browser session.

For marketing directors and executive leadership, the business risk often shows up as brand damage (malicious content appearing to originate from your domain), campaign disruption (loss of confidence in landing pages and forms), and increased compliance and incident-response costs if the organization must investigate whether user sessions, customer interactions, or web analytics were manipulated.

Remediation note: There is no known patch available for this issue per the published advisory. Organizations should review the details and apply mitigations aligned to risk tolerance; in many cases, the safest business decision is to uninstall the affected software and replace it with a maintained alternative.

Similar Attacks

Reflected XSS is a common web attack pattern, and it has affected a wide range of organizations and software ecosystems over time. The following examples illustrate the broader class of risk (not this plugin specifically):

US-CERT/CISA alert on Internet Explorer vulnerabilities used in targeted attacks (examples of browser-based exploitation and the business impact of web-delivered attacks).

PortSwigger Web Security Academy: Cross-site scripting (XSS) (widely referenced background on XSS techniques and real-world consequences).

OWASP: Cross Site Scripting (XSS) (industry-standard overview of XSS and how it is commonly abused).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers