Simple Download Counter Vulnerability (Medium) – CVE-2026-4278

Simple Download Counter Vulnerability (Medium) – CVE-2026-4278

by | Mar 25, 2026 | Plugins

Attack Vectors

CVE-2026-4278 affects the Simple Download Counter WordPress plugin (slug: simple-download-counter) in versions up to and including 2.3. This is a Medium severity issue (CVSS 6.4) involving Stored Cross-Site Scripting (XSS).

The primary attack path is through the plugin’s “sdc_menu” shortcode. An authenticated WordPress user with at least Contributor privileges (or any role that can place the shortcode into content) could embed malicious script into shortcode attributes—specifically text and cat—so that the payload is stored and later executed when someone views the affected page.

Because this is stored in site content, it can be triggered repeatedly and at scale (e.g., on a popular landing page or resource hub), impacting internal teams and external visitors without requiring them to click anything unusual.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping for user-supplied shortcode attributes in Simple Download Counter. According to the published advisory, the text attribute is output directly into HTML content without proper escaping, and the cat attribute is used unescaped in HTML class attributes.

This gap creates an opportunity for an authenticated attacker to inject scripts that execute in a visitor’s browser under your site’s trusted domain, which is the core risk with Stored XSS.

Reference: CVE-2026-4278 and Wordfence advisory source: Wordfence Threat Intel.

Technical or Business Impacts

For leadership, the key concern is that Stored XSS can turn a trusted marketing page into a delivery mechanism for unwanted behavior, which may directly affect revenue, reputation, and compliance outcomes.

Potential impacts include:

  • Brand and customer trust damage: visitors may see altered content, unexpected pop-ups, or redirections originating from your official site.
  • Lead and campaign integrity risk: on-page content tied to campaigns (CTAs, forms, download pages) could be modified to misdirect prospects or degrade conversion performance.
  • Account and session exposure: scripts executing in an admin or editor’s browser could potentially be used to take actions on their behalf, depending on what that user is doing and what protections are in place.
  • Compliance and incident response costs: if malicious scripts affect tracking, consent banners, or user data collection flows, it can trigger investigation, reporting, and remediation work across Marketing, IT, and Compliance.

This is especially relevant for sites that allow multiple contributors (agencies, freelancers, distributed marketing teams), where content publishing pathways are broader.

Similar Attacks

Stored XSS has a long history of being used to spread quickly across high-traffic platforms and trusted pages:

Remediation

Update Simple Download Counter to version 2.3.1 or newer (patched) as the primary fix. This directly addresses the vulnerable behavior in versions up to 2.3.

Additional risk-reduction steps that are practical for marketing-led sites:

  • Review who can publish content: limit Contributor/Author access to trusted users and remove stale accounts (including agencies or former contractors).
  • Audit pages using the “sdc_menu” shortcode: search posts/pages for the shortcode and review the text and cat attributes for unexpected or suspicious content.
  • Strengthen change control: require editorial review for updates to high-traffic landing pages and download pages.
  • Maintain plugin hygiene: remove unused plugins and keep WordPress, themes, and plugins updated to reduce exposure to similar issues.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers