pixfort-core Vulnerability (Medium) – CVE-2026-28072

pixfort-core Vulnerability (Medium) – CVE-2026-28072

by | Mar 12, 2026 | Plugins

Attack Vectors

pixfort-core (pixfort Core) versions 3.2.22 and earlier are affected by a Medium-severity Reflected Cross-Site Scripting (XSS) vulnerability (CVE-2026-28072, CVSS 6.1). This type of issue is commonly exploited through social engineering: an attacker sends a crafted link (email, ad, direct message, or a compromised website redirect) that a user is tricked into clicking.

Because this vulnerability can be triggered by an unauthenticated attacker, the primary “gate” is user interaction (for example, clicking a link or loading a specially crafted page). In practical business terms, this is often seen in phishing-style campaigns targeting marketing, finance, and operations staff who regularly interact with links, dashboards, and shared resources.

Security Weakness

The issue is caused by insufficient input sanitization and output escaping in the pixfort Core plugin. In plain terms, the plugin can allow untrusted data to be reflected back into a page without proper safeguards, enabling injected scripts to run in a victim’s browser.

This weakness can allow an attacker to make a legitimate-looking page or link behave in an unsafe way. The vulnerability is reported by Wordfence’s threat intelligence and applies to pixfort Core versions up to and including 3.2.22 (source).

Technical or Business Impacts

Reflected XSS is often used to mislead users and capture sensitive information or actions performed in the browser. While this CVSS vector indicates no direct server takeover, it can still produce material risk—especially for organizations with multiple WordPress admin users, marketing automation integrations, or shared credentials and sessions.

Potential business impacts include:

Account compromise risk: If an administrative or privileged user is tricked into clicking a malicious link while logged in, attackers may be able to abuse that session to perform unwanted actions.

Brand and customer trust damage: Even a single incident involving malicious scripts on a branded web experience can undermine trust, affect conversion rates, and trigger customer support escalations.

Compliance and reporting pressure: If the attack leads to exposure of customer or employee data (even indirectly via browser-based theft), it can create regulatory and contractual obligations for investigation, notification, and evidence of remediation.

Operational disruption: Marketing and web teams may need to pause campaigns, rotate credentials, invalidate sessions, and perform incident response activities that consume time and budget.

Recommended remediation: Update pixfort Core to version 3.2.26 or newer (a patched version). After updating, consider reviewing user accounts with elevated privileges, ensuring phishing awareness is reinforced for staff, and confirming that web security controls (e.g., a WAF) are active and monitored.

Similar Attacks

Reflected XSS has a long history of being used in real-world attacks across widely deployed web components. A few notable examples include:

CVE-2019-11358 (jQuery) – A widely publicized issue in a common web library that enabled script injection under certain conditions, illustrating how browser-side vulnerabilities can quickly become mass-exploitation targets.

CVE-2020-11022 (jQuery) – Another major XSS-related vulnerability affecting a ubiquitous frontend dependency, frequently cited to emphasize the business impact of script injection risks.

CVE-2019-9978 (WordPress plugin Social Warfare) – A WordPress ecosystem example where an XSS-style flaw drew attention due to its potential to impact site visitors and administrators.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers