Injection Guard Vulnerability (High) – CVE-2026-3368

Injection Guard Vulnerability (High) – CVE-2026-3368

by | Mar 20, 2026 | Plugins

Attack Vectors

CVE-2026-3368 is a High-severity (CVSS 7.2) vulnerability affecting the Injection Guard WordPress plugin (slug: injection-guard) in versions up to and including 1.2.9. It is an unauthenticated stored cross-site scripting (XSS) issue that can be triggered using malicious query parameter names (the parameter “keys” in a URL) during normal requests to your website.

Because it does not require a login (PR:N) and can be reached over the network (AV:N), an attacker can attempt exploitation by sending crafted links or requests (for example through email, ads, social posts, or automated scanning). The malicious content may then be stored by the plugin and later executed in a user’s browser when those stored entries are viewed in the WordPress admin interface.

Security Weakness

The root cause is insufficient input handling and output protection in the plugin’s flow that captures and displays query-string data. According to the published advisory, the sanitize_ig_data() function sanitizes array values but not array keys, while the ig_settings.php template echoes stored parameter keys into HTML without proper escaping. As a result, specially crafted parameter names can be stored and later rendered as active script content.

This is particularly risky because the plugin reads the site’s query string (via $_SERVER['QUERY_STRING']) and applies URL handling that preserves URL-encoded special characters, which can help attacker-supplied input survive long enough to be stored and displayed.

Technical or Business Impacts

Stored XSS commonly enables outcomes that matter directly to leadership and compliance teams: theft of authenticated session data, unauthorized actions performed in a logged-in user’s browser (including administrative actions if an admin views the affected page), tampering with site content, redirecting visitors to malicious destinations, and reputational damage from visible defacement or browser warnings. Even when the data exposure is “limited” on paper (C:L/I:L in the CVSS vector), the business impact can be significant if an administrator account is abused to change site settings, add rogue users, or plant persistent malware.

Similar Attacks: XSS has repeatedly been used to spread malicious code and compromise user accounts at scale, including the Samy MySpace worm (self-propagating XSS) and the British Airways web compromise (injected scripts used to capture sensitive data).

Remediation: Update Injection Guard to version 1.3.0 or newer (patched). After updating, review WordPress admin users, recent configuration changes, and any unusual redirects or injected content. If your organization has compliance obligations, document the patch date and validation steps, and consider a brief internal incident review if the plugin was exposed and actively used.

Reference: CVE-2026-3368 and the advisory source from Wordfence Threat Intelligence.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers