Attack Vectors
CVE-2026-3659 is a Medium severity (CVSS 6.4, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) Stored Cross-Site Scripting (XSS) vulnerability affecting the WP Circliful WordPress plugin (slug: wp-circliful) in versions up to and including 1.2.
The attack requires an authenticated WordPress user with at least Contributor permissions (or any role allowed to place the relevant shortcodes in content). An attacker can embed malicious input into shortcode attributes used by [circliful] (via the id attribute) and [circliful_direct] (via multiple attributes), causing the script to be stored in site content and executed when the affected page is viewed.
Because this is stored in content, the malicious code can execute for multiple visitors over time—potentially including internal staff who regularly review or approve content (marketing teams, editors, compliance reviewers) and site administrators.
Security Weakness
The issue stems from insufficient input sanitization and output escaping of user-supplied shortcode attributes in WP Circliful. According to the published details, the plugin concatenates the id shortcode attribute directly into an HTML id attribute without proper escaping, enabling an attacker to break out of the attribute context and inject script content.
This is a classic Stored XSS pattern: when untrusted input is saved (in this case, within post/page content containing shortcodes) and later rendered into HTML without appropriate escaping, it can run in visitors’ browsers under your site’s trusted domain.
Status: The advisory indicates no known patch is available at this time. Reference: Wordfence vulnerability record and CVE-2026-3659.
Technical or Business Impacts
Brand and customer trust risk: Visitors may be redirected, shown fraudulent prompts, or served malicious scripts from pages that appear legitimate—particularly damaging for marketing landing pages, campaign microsites, and high-traffic content.
Account takeover and operational risk: Stored XSS can be used to steal session data or perform actions in a logged-in user’s browser context. If an administrator or editor views an infected page, it can amplify the incident impact across your WordPress environment.
Compliance and privacy exposure: The CVSS vector indicates potential confidentiality and integrity impact. If malicious scripts capture form submissions or user interactions, this can create privacy and regulatory concerns, especially for teams handling lead-gen forms and customer data.
Practical mitigations (given no known patch): Consider uninstalling and replacing WP Circliful (often the safest option when a fix is not available). If you must temporarily keep it, reduce exposure by limiting which roles can publish/insert the affected shortcodes, tightening content approval workflows, auditing existing content for use of [circliful] and [circliful_direct], and increasing monitoring for unexpected script behavior on marketing pages.
Similar Attacks
Stored XSS in WordPress plugins is a recurring issue, often tied to inadequate escaping of shortcode or form parameters. A few real-world examples include:
CVE-2023-2735 (Stored XSS in a WordPress plugin context)
CVE-2021-24284 (WordPress plugin Stored XSS)
CVE-2020-11738 (WordPress plugin Stored XSS)
Recent Comments