Easy Voice Mail Vulnerability (Medium) – CVE-2026-1164

Easy Voice Mail Vulnerability (Medium) – CVE-2026-1164

by | Mar 6, 2026 | Plugins

Attack Vectors

The WordPress plugin Easy Voice Mail (slug: easy-voice-mail) is affected by a Medium-severity Stored Cross-Site Scripting (XSS) issue (CVE-2026-1164, CVSS 6.1). The vulnerability is tied to the message parameter and impacts all versions up to and including 1.2.5.

In practical terms, the attack path involves someone with high-level WordPress access being able to place a malicious script into content handled by the plugin, which then runs when other people view the affected page. This is especially relevant for organizations where multiple leaders, admins, agencies, or vendors have access to the WordPress back end.

Security Weakness

CVE-2026-1164 is caused by insufficient input sanitization and output escaping in Easy Voice Mail’s handling of the message field. When untrusted content is stored and later displayed without adequate safeguards, a stored XSS condition can occur.

While XSS is often described in technical terms, the business takeaway is straightforward: a website component is allowing user-supplied content to be saved in a way that can become active code in a visitor’s browser. That creates risk wherever that stored content is later viewed by staff, customers, or partners.

Technical or Business Impacts

Stored XSS in a public-facing or operational site can translate quickly into business exposure. If exploited, it may enable actions such as manipulating what visitors see on key pages, redirecting users, or capturing information entered into site forms—depending on where the injected content is displayed and who views it.

For marketing directors and executives, the highest-impact risks often include: brand damage (defaced or misleading pages), campaign integrity issues (traffic diverted or tracking manipulated), loss of stakeholder trust, and compliance concerns if user data is exposed through browser-based script execution. Because the vulnerability has a Medium severity rating, it should be treated as a priority patch—particularly for sites supporting lead generation, customer communications, or regulated business processes.

Recommended remediation: Update Easy Voice Mail to version 1.2.6 or newer patched versions to address CVE-2026-1164.

Similar Attacks

Stored cross-site scripting has been used repeatedly to impact organizations by altering site content, redirecting traffic, and undermining trust. For context, here are real examples of XSS vulnerabilities affecting widely used platforms or plugins:

CVE-2023-2745 (WordPress Core) – Stored XSS

CVE-2020-25213 (WP File Manager plugin) – XSS issue

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers