Wikilookup Vulnerability (Medium) – CVE-2026-3354

Wikilookup Vulnerability (Medium) – CVE-2026-3354

by | Mar 20, 2026 | Plugins

Attack Vectors

CVE-2026-3354 is a Medium-severity stored cross-site scripting (XSS) issue (CVSS 4.4) affecting the Wikilookup WordPress plugin (versions <= 1.1.5). The vulnerable entry point is the plugin’s “Popup Width” setting.

This is an authenticated vulnerability that requires Administrator-level access or higher. In practical terms, the risk most often comes from (1) a compromised admin account (phishing, password reuse, session theft), (2) a malicious insider, or (3) an attacker who first gains admin access through another weakness and then uses this issue to persist their control.

Important scope note: the reported impact applies to multi-site installations and to installations where unfiltered_html has been disabled. In those environments, injected code can be stored and then executed when a user visits an affected page.

Security Weakness

The underlying weakness is insufficient input sanitization and output escaping for the “Popup Width” configuration value. That means the plugin does not adequately validate what is saved, and/or does not safely render that value when pages are displayed.

Because this is a stored XSS, the malicious payload can remain in the site’s configuration and trigger repeatedly whenever an affected page is viewed—turning a single successful injection into an ongoing exposure.

No vendor patch is currently known. Reference: CVE-2026-3354 and the published advisory source from Wordfence.

Technical or Business Impacts

Even with the “Administrator+” prerequisite, stored XSS can create meaningful business risk because it can be used to persist access and abuse trust inside your web environment. For example, a successful payload may be able to run actions in a victim’s browser under your site’s brand—especially damaging when the victim is another administrator, a content publisher, or a site operator.

Potential business impacts include:

  • Account takeover acceleration: If an attacker already has one admin account, stored XSS can help compromise additional privileged users who view affected pages.
  • Content and brand integrity damage: Unauthorized scripts can deface pages, inject unwanted redirects, or add fraudulent calls-to-action that undermine marketing performance and trust.
  • Privacy and compliance exposure: Depending on what the injected code does, it may capture user interactions or session information. This can complicate incident response and raise compliance concerns, especially on multi-site environments used by multiple business units or brands.
  • Operational disruption: Investigating and cleaning a stored XSS often requires configuration review, database checks, and regression testing across multiple sites in a network.

Recommended response (given no known patch): inventory where Wikilookup is installed (especially multi-site networks), assess whether you can uninstall and replace the plugin, and tighten governance around admin access (MFA for admins, least-privilege roles, and regular review of who has Administrator rights). If you must keep it temporarily, consider restricting access to wp-admin by IP/VPN and increasing monitoring of settings changes and admin activity.

Similar Attacks

Stored XSS is a recurring issue across content management systems and dependencies because it exploits the same core failure: letting untrusted input be saved and later rendered in a trusted context. A few well-known examples include:

  • CVE-2019-8942 (WordPress) – a vulnerability chain involving media handling that could be leveraged for cross-site scripting scenarios under certain conditions.
  • CVE-2020-11022 (jQuery) – a widely impactful XSS issue in a common web dependency, illustrating how input handling flaws can scale across many sites.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers