Any Post Slider Vulnerability (Medium) – CVE-2026-1899

Any Post Slider Vulnerability (Medium) – CVE-2026-1899

by | Mar 20, 2026 | Plugins

Attack Vectors

CVE-2026-1899 is a Medium-severity vulnerability (CVSS 6.4) affecting the Any Post Slider WordPress plugin (slug: any-post-slider) in versions 1.0.4 and earlier. It enables an authenticated attacker with Contributor-level access (or higher) to plant a stored cross-site scripting (XSS) payload.

The attack is carried out by inserting malicious code into the post_type attribute of the plugin’s aps_slider shortcode. Because the payload is stored, it can execute later when a visitor or staff member loads the affected page, post, or any area where that shortcode is rendered.

This is particularly relevant for organizations where Contributors, freelancers, agencies, or multiple internal teams can draft content, manage landing pages, or edit posts—common in marketing-led WordPress operations.

Security Weakness

The underlying issue is insufficient input sanitization and output escaping for the post_type shortcode attribute in Any Post Slider (through 1.0.4). In practical terms, the plugin does not adequately validate what is allowed into that field, and does not safely render it back to the browser.

This gap can allow scripts to run in a user’s browser under your site’s trusted brand and domain. According to the published advisory, the vulnerability exists in all versions up to and including 1.0.4, and there is currently no known patch available.

Reference: CVE-2026-1899 record and the vendor-reported details from Wordfence Threat Intelligence.

Technical or Business Impacts

While rated Medium, stored XSS can create outsized business risk because it can affect customers, prospects, and employees who load an impacted page. Depending on where the shortcode is used (homepage modules, landing pages, blog templates, campaign pages), the exposure can be broad.

Potential impacts include:

• Brand and customer trust damage: Visitors may see unexpected redirects, pop-ups, or altered page content, undermining campaign performance and brand credibility.

• Account and session risk: If an administrative user views a poisoned page while logged in, the attacker may be able to leverage that session to take further actions (for example, changing content or creating new access paths), depending on the payload and other site controls.

• Marketing and revenue disruption: Compromised landing pages can reduce conversion rates, disrupt paid media spend efficiency, and trigger emergency site changes during active campaigns.

• Compliance and reporting exposure: For regulated organizations, script injection incidents may raise questions about website integrity controls, change management, and access governance (especially where Contributors or third parties can publish or influence content).

Mitigation guidance (given no known patch): Many organizations will choose to uninstall Any Post Slider and replace it with an alternative. If you must keep it temporarily, consider limiting who can create/edit content that includes the aps_slider shortcode, tightening Contributor permissions, increasing content review workflows, and adding monitoring for unusual shortcode usage—balanced against your organization’s risk tolerance.

Similar Attacks

Stored XSS is a recurring pattern in content-management systems because attackers aim to plant code in places that are rendered to many users. A well-known example is the WordPress core stored XSS issue in older versions that could be triggered through crafted comment content:

CVE-2015-3440 (WordPress) — Stored XSS via comments

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers