Coachific Shortcode Vulnerability (Medium) – CVE-2026-4005

Coachific Shortcode Vulnerability (Medium) – CVE-2026-4005

by | Apr 14, 2026 | Plugins

Attack Vectors

CVE-2026-4005 is a Medium-severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the Coachific Shortcode WordPress plugin (slug: coachific-shortcode) in all versions up to and including 1.0.

The attack requires an authenticated WordPress account with at least Contributor privileges (or higher). An attacker can place a malicious payload in the shortcode’s userhash attribute. Because the payload can be stored and later executed when content is viewed, this becomes a “stored” XSS risk rather than a one-time, click-driven issue.

In practical terms for business teams: if your editorial workflow includes guest authors, contractors, interns, or multiple internal contributors, this expands the pool of accounts that could be abused through phishing, credential reuse, or insider risk—without requiring admin-level access.

Security Weakness

The vulnerability exists due to insufficient input handling for a JavaScript context. The plugin applies sanitize_text_field() to the userhash value, which can remove HTML tags but does not properly protect against characters that are significant inside a JavaScript string (for example, quotes and other characters that can break out of a string).

Per the published advisory, the sanitized value is then directly interpolated into a JavaScript string within a <script> tag without appropriate JavaScript-specific escaping, enabling Stored XSS under the right conditions.

Reference: CVE-2026-4005 record and the research write-up from Wordfence Threat Intelligence.

Technical or Business Impacts

Stored XSS can translate quickly into business risk because it can execute in a trusted website context. Potential outcomes include: session theft (leading to account takeover), unauthorized actions performed as the victim user, content manipulation, and the insertion of deceptive prompts that capture leads or payment information.

For marketing and executive stakeholders, the most likely high-impact scenarios are brand damage (malicious pop-ups or defacement visible to customers), lead and revenue loss (redirecting campaign traffic), and compliance exposure (customer data capture via deceptive forms). Even with a Medium CVSS score, the “stored” nature means the payload can persist on high-traffic pages until discovered.

Remediation status: there is no known patch available at this time. Based on risk tolerance, the safest approach may be to uninstall Coachific Shortcode and replace it with an alternative that is actively maintained. If removal is not immediately possible, consider mitigations such as restricting Contributor access, tightening publishing workflows (e.g., requiring review before publish), and increasing monitoring for unexpected script behavior on public pages.

Similar Attacks

Stored XSS has been used historically to spread quickly and impact large audiences by executing in the context of trusted sites and user sessions. Notable real-world examples include:

The “Samy” MySpace worm (stored XSS)
The 2010 “onMouseOver” Twitter XSS incident (self-propagating behavior)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers