WP Games Embed Vulnerability (Medium) – CVE-2026-3996

WP Games Embed Vulnerability (Medium) – CVE-2026-3996

by | Mar 20, 2026 | Plugins

Attack Vectors

WP Games Embed (slug: wp-games-embed) versions up to and including 0.1beta contain a Medium severity vulnerability (CVE-2026-3996, CVSS 6.4) that can be exploited by an authenticated user with at least Contributor permissions.

The attack path is straightforward in organizations where multiple people can create or edit content. An attacker (or a compromised Contributor account) can place malicious code inside the [game] shortcode attributes—such as width, height, src, title, description, game_url, main, and thumb—and save it within a post or page. Because the injected content is stored in WordPress, the malicious script can execute later when others view the affected content, without requiring additional interaction.

This is particularly relevant for marketing and content teams because Contributors are often granted access for publishing workflows, campaign pages, landing pages, and blog posts—making stored attacks more likely to spread unnoticed across high-traffic pages.

Security Weakness

The vulnerability is a Stored Cross-Site Scripting (Stored XSS) issue caused by insufficient input sanitization and output escaping of user-supplied shortcode attributes. According to the advisory, these attributes are directly concatenated into HTML output without escaping, creating an opportunity to inject arbitrary scripts into the rendered page.

The key business-risk point: the weakness does not require server access or advanced exploitation. It leverages standard content editing functions available to Contributors, meaning the “attack surface” includes routine publishing activity and any user accounts that could be phished, reused from other breaches, or otherwise compromised.

At the time of the advisory, there is no known patch available. That elevates the urgency of mitigation decisions (e.g., restricting use, disabling the shortcode, or uninstalling/replacing the plugin) based on your organization’s risk tolerance.

Technical or Business Impacts

Stored XSS in a WordPress site can translate directly into business risk, especially on pages used for lead generation, brand communications, and customer engagement. Potential impacts include:

Brand and customer trust damage: Visitors may experience unexpected redirects, pop-ups, or content manipulation on your site, which can quickly undermine credibility and campaign performance.

Account compromise and workflow disruption: Malicious scripts can be used to capture session information or perform actions in a logged-in user’s browser context, potentially enabling further privilege abuse (depending on what users view the infected content).

Data exposure and compliance concerns: If malicious scripts are used to collect form inputs or user data in the browser, this can create incident response and regulatory exposure—particularly for organizations handling customer contact data, marketing lists, or other sensitive information.

Campaign and revenue impact: Compromised landing pages can reduce conversion rates, increase ad spend waste, and create downstream costs from incident response, remediation, and reputational recovery.

Given the Medium severity rating and no known patch, organizations should treat this as a risk-management decision: if the plugin is not business-critical, uninstalling and replacing it may be the lowest-risk option; if it is business-critical, prioritize compensating controls (tightening Contributor permissions, limiting who can use the shortcode, and increasing monitoring of content changes).

Similar Attacks

Stored XSS in WordPress plugins has been a recurring issue because it often sits at the intersection of content workflows and web rendering. For context, here are a few real examples of similar plugin-related XSS patterns:

CVE-2024-27956 (WordPress plugin XSS example)
CVE-2023-2745 (WordPress plugin XSS example)
CVE-2022-21661 (WordPress-related XSS example)

For this specific issue, track the authoritative record here: CVE-2026-3996, and the vendor analysis here: Wordfence advisory.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers