Name Directory Vulnerability (High) – CVE-2026-3178

Name Directory Vulnerability (High) – CVE-2026-3178

by | Mar 11, 2026 | Plugins

Attack Vectors

The WordPress plugin Name Directory (slug: name-directory) contains a High severity vulnerability (CVSS 7.2) identified as CVE-2026-3178. It is an unauthenticated stored cross-site scripting (XSS) issue, meaning an attacker does not need a login to exploit it.

The attack vector is the name_directory_name parameter. Because input is not sufficiently sanitized and output is not properly escaped, an attacker can submit malicious content that becomes stored in your site and then runs in visitors’ browsers when they view the affected page(s).

This matters for business leaders because it can be exploited remotely over the internet and can execute without a user taking any special action beyond loading a page. While the vulnerability is described as partially patched in versions 1.30.3 and 1.32.1, the issue affects all versions up to and including 1.32.1, and the recommended remediation is to update to 1.33.0 or later.

Security Weakness

This vulnerability is caused by insufficient input sanitization (allowing unsafe content to be saved) and insufficient output escaping (allowing that unsafe content to be rendered and executed in a browser). In practical terms, the plugin does not consistently treat the name_directory_name field as untrusted input.

Stored XSS is particularly risky because the malicious script can persist on your website until removed, potentially impacting multiple users over time—including staff members who access admin areas, marketing dashboards, analytics tools, or customer data systems via the same browser session.

Remediation is straightforward: update Name Directory to version 1.33.0 or newer. Given the note that earlier releases were only partially patched, organizations should avoid relying on interim versions as “good enough” and move directly to the fully patched release.

Technical or Business Impacts

If exploited, this stored XSS flaw can undermine trust in your brand and introduce real business risk. Common outcomes include unauthorized actions performed in a victim’s browser session, manipulation of on-page content, and the insertion of malicious redirects or deceptive forms that can harm customers and prospects.

For marketing and revenue teams, the impacts can include damaged conversion rates, paid-media waste if landing pages are modified or redirected, and reputational harm if visitors see defaced content or are pushed to suspicious destinations.

For executives and compliance stakeholders, the risk expands to potential exposure of sensitive information accessible via the browser session and increased incident response costs (triage, cleanup, communications, legal/compliance review). Even without direct data theft, a confirmed website compromise can trigger contractual, regulatory, and reporting obligations depending on your industry and geography.

Recommended action: upgrade the Name Directory plugin to 1.33.0+ promptly, validate that no suspicious content was stored in directory entries or related pages, and review website logs for unusual unauthenticated submissions targeting the name_directory_name parameter.

Similar Attacks

Stored XSS has been repeatedly used in real-world campaigns to deface websites, redirect users, and steal session data. For context, here are a few examples of notable cross-site scripting disclosures and write-ups:

PortSwigger: Cross-site scripting (XSS) explained
OWASP: Cross Site Scripting (XSS)
CISA Alerts (frequent web exploitation advisories)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers