Consensus Embed Vulnerability (Medium) – CVE-2026-1823

Consensus Embed Vulnerability (Medium) – CVE-2026-1823

by | Mar 6, 2026 | Plugins

Attack Vectors

Consensus Embed (slug: consensus-embed) has a Medium severity vulnerability (CVSS 6.4, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) tracked as CVE-2026-1823.

The issue is a stored cross-site scripting (XSS) risk triggered through the plugin’s consensus shortcode, specifically via the src shortcode attribute. An attacker must be authenticated with at least Contributor-level permissions (or higher). In practical business terms, this means any account that can add or edit content where the shortcode is used could potentially place harmful script content into a page or post.

Because it is stored, the malicious content can execute whenever someone visits the affected page—without the visitor needing to click anything. This makes routine site traffic (customers, prospects, partners, employees) a potential “delivery channel” for the attack if a page is compromised.

Security Weakness

According to the published advisory, Consensus Embed is vulnerable in all versions up to and including 1.6 due to insufficient input sanitization and output escaping of user-supplied shortcode attributes. In other words, the plugin does not adequately validate what is placed into the shortcode attribute and does not reliably neutralize it when rendering the page.

This weakness is especially relevant to organizations where multiple teams publish content (marketing, comms, agencies, regional teams) and where contributor accounts are common. Even well-meaning users can unintentionally introduce risk if an account is compromised or if permissions are broader than necessary.

At the time of this advisory, there is no known patch available. The recommended approach is to review the details carefully and apply mitigations aligned to your organization’s risk tolerance—potentially including removing the plugin and replacing it.

Technical or Business Impacts

Brand and trust risk: A stored XSS issue can be used to display unauthorized content, redirect visitors, or alter on-page experiences. For marketing leaders, this can directly impact campaign integrity, landing page performance, and customer trust.

Data and account exposure: While specifics depend on how the malicious script is used, this class of issue can enable attackers to run unauthorized actions in a visitor’s browser context. That can translate into increased risk of session misuse, content manipulation, and exposure of information accessible through the affected browsing session (consistent with the CVSS confidentiality and integrity impacts noted in the vector).

Compliance and governance impact: Because the attack can affect visitors and potentially internal users (including administrators) who view infected pages, it increases the likelihood of downstream incidents that trigger internal reporting, compliance review, or third-party notifications—especially if customer data or authenticated sessions are implicated.

Operational disruption: With no known patch available, mitigation may require changes to publishing workflows, stricter role permissions, removal of the shortcode from content, enhanced monitoring, or uninstalling the plugin—each of which can disrupt content operations and planned releases.

Similar Attacks

Stored XSS vulnerabilities in WordPress plugins have been widely abused to deface pages, inject unauthorized scripts, and compromise visitor trust. Here are a few well-documented examples to help contextualize the risk:

CISA KEV updates including a WordPress plugin stored XSS (Popup Builder, CVE-2023-6000)

WordPress Security Hardening guidance (context for preventing common web attacks, including script injection)

Wordfence advisory source for Consensus Embed vulnerability details

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers