BWL Advanced FAQ Manager Lite Vulnerability (Medium) – CVE-2026-4075

BWL Advanced FAQ Manager Lite Vulnerability (Medium) – CVE-2026-4075

by | Mar 25, 2026 | Plugins

Attack Vectors

CVE-2026-4075 is a Medium-severity stored cross-site scripting (XSS) vulnerability (CVSS 6.4) affecting BWL Advanced FAQ Manager Lite (slug: bwl-advanced-faq-manager-lite) in versions up to and including 1.1.1.

The most realistic attack path requires an attacker to have authenticated WordPress access at Contributor level or higher. With that access, they can embed malicious input into the baf_sbox shortcode—specifically through attributes such as sbox_id (and also sbox_class, placeholder, highlight_color, highlight_bg, and cont_ext_class). Because this is a stored XSS issue, the payload can persist and execute when the affected content is viewed by others, depending on where the shortcode is used and who views the page.

Official record: https://www.cve.org/CVERecord?id=CVE-2026-4075

Security Weakness

The vulnerability stems from insufficient input sanitization and output escaping for user-controlled shortcode attributes. According to the published advisory, these attributes are interpolated into HTML element attributes without appropriate attribute escaping (for example, missing esc_attr() in the shortcode rendering path), allowing crafted input to break out of an attribute context and introduce script-capable content.

In business terms, this is an avoidable validation/escaping gap: the plugin treats shortcode attributes as trusted even though they can be supplied by a logged-in user who may not be fully trusted (including compromised contributor accounts).

Source advisory: Wordfence vulnerability entry

Technical or Business Impacts

Stored XSS is frequently a business-risk multiplier because it can turn a single compromised low-privilege account into broader impact across users who view the affected page(s). Potential outcomes can include:

Brand and customer trust impact: defaced pages, malicious pop-ups, or invisible redirects can damage credibility and reduce conversion rates—especially harmful for marketing and campaign landing pages.

Account and data exposure risk: depending on how the payload is used and who views the affected content, attackers may attempt to hijack sessions or trick users into disclosing credentials (e.g., phishing overlays). This can expand the incident from “content issue” to “business systems exposure.”

Operational disruption: remediation may require page/post audits, temporary content takedowns, incident communications, and additional approvals for publishing—slowing campaign execution and increasing overhead for marketing and web teams.

Compliance considerations: if malicious code leads to unauthorized access or user data exposure, it may trigger reporting and documentation obligations (depending on your regulatory environment and contractual commitments).

Recommended action: update BWL Advanced FAQ Manager Lite to version 1.1.2 or newer (patched), then review where the baf_sbox shortcode is used and validate that no untrusted contributors can publish or inject shortcodes into high-visibility pages.

Similar Attacks

Stored XSS has been used in real-world incidents to rapidly spread malicious content and compromise user sessions. Examples include:

The “Samy” MySpace worm (classic stored XSS worm that propagated automatically across profiles).

TweetDeck XSS incident coverage (TweetDeck) (stored/DOM-based XSS abuse leading to self-propagating posts across accounts; multiple public write-ups reference this incident).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers