Reading progressbar Vulnerability (Medium) – CVE-2026-2687

Reading progressbar Vulnerability (Medium) – CVE-2026-2687

by | Mar 19, 2026 | Plugins

Attack Vectors

CVE-2026-2687 is a Medium severity Stored Cross-Site Scripting (XSS) issue (CVSS 4.4: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N) affecting the Reading progressbar WordPress plugin (slug: reading-progress-bar) in versions up to 1.3.1.

The attack requires an authenticated user with administrator-level access (or higher) to inject malicious script into content that will later run when someone visits the affected page.

This vulnerability only affects (1) WordPress multisite installations and (2) sites where unfiltered_html has been disabled. In those environments, the risk is higher because administrators may not be able to safely use certain HTML, and improper handling can lead to persistent script execution.

Security Weakness

The core issue is insufficient input sanitization and output escaping in Reading progressbar versions up to 1.3.1. In practical terms, the plugin does not reliably clean potentially unsafe input before storing it, and/or does not safely render stored values back into the admin or front-end interface.

Because this is stored XSS (not just a one-time reflected link), the malicious code can persist and execute repeatedly for each visitor who loads the injected page—until removed.

Technical or Business Impacts

Even with the requirement of administrator-level access, this vulnerability can materially increase business risk in scenarios such as shared admin accounts, compromised admin credentials, malicious insiders, or third-party agencies with elevated permissions.

Potential impacts include:

Brand and customer trust damage: Visitors could be redirected, shown unwanted content, or exposed to deceptive prompts that appear to be part of your website experience.

Data exposure: The CVSS rating indicates low confidentiality and integrity impact, but stored scripts can still be used to attempt session theft, manipulate what users see, or capture information entered into pages—depending on where the script executes and what defenses are in place.

Compliance and governance concerns: For organizations with compliance obligations, persistent client-side scripting issues can trigger incident response requirements, audit findings, and vendor-management scrutiny—especially if multiple teams and partners have administrative access.

Remediation: Follow the vendor guidance to update Reading progressbar to version 1.3.1, or a newer patched version. Also review who has administrator access, enforce strong authentication, and remove any unnecessary elevated accounts—particularly on multisite environments and sites where unfiltered_html is disabled.

Reference: CVE-2026-2687 record and Wordfence advisory source: Wordfence vulnerability details.

Similar Attacks

Stored XSS has been used in real-world incidents to spread quickly and impact large user bases. Notable examples include:

The “Samy” MySpace worm (a classic stored XSS incident that spread virally across profiles).

The 2009 Twitter “onMouseOver” worm (an XSS-driven event that rapidly propagated through user interactions).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers