WP App Bar Vulnerability (High) – CVE-2026-1074

WP App Bar Vulnerability (High) – CVE-2026-1074

by | Mar 6, 2026 | Plugins

Attack Vectors

High severity vulnerability (CVSS 7.2) affects the WordPress plugin WP App Bar (slug: wp-app-bar) in versions up to and including 1.5. Identified as CVE-2026-1074, this issue allows unauthenticated attackers to inject stored malicious scripts using the ‘app-bar-features’ parameter.

The injected script is stored in plugin settings and can execute when someone with access visits the plugin’s admin settings page. Because the attacker does not need credentials, this risk is relevant to any site running an affected version, especially if the WordPress admin area is frequently accessed by staff or agencies.

Security Weakness

The weakness is a Stored Cross-Site Scripting (XSS) flaw caused by insufficient input sanitization and output escaping, combined with a missing authorization check in the App_Bar_Settings class constructor. In practical terms, this means data can be accepted and later displayed in the admin interface in a way that allows injected scripts to run.

This combination is particularly concerning from a governance standpoint: when authorization checks are missing, it increases the chance that security controls expected by administrators and compliance teams (such as “only authenticated users can change settings”) do not actually apply.

Technical or Business Impacts

If exploited, stored scripts can run in the context of an administrator’s browser session while they view settings. That can translate into real business risk, including unauthorized changes to site configuration, disruption of marketing operations, and exposure of limited sensitive information tied to the affected admin session.

For marketing directors, CEOs, COOs, CFOs, and compliance teams, the key concern is the potential for brand and operational impact: attackers may be able to manipulate site behavior, interfere with campaign pages, or undermine trust through content changes. The vulnerability’s High severity and unauthenticated nature can increase the likelihood of opportunistic scanning and exploitation.

Remediation note: there is no known patch available. Based on your organization’s risk tolerance, consider uninstalling WP App Bar and replacing it with an alternative. Review the source advisory for details and mitigation guidance: Wordfence vulnerability record.

Similar Attacks

Stored XSS in WordPress plugins has been used in real-world incidents to compromise administrative sessions and modify site content. Examples include:

CISA alert: WordPress plugin vulnerability leads to website takeovers (2023)

Wordfence reporting on active exploitation of WordPress vulnerabilities (example coverage)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers