WPBookit Vulnerability (High) – CVE-2026-1945

WPBookit Vulnerability (High) – CVE-2026-1945

by | Mar 3, 2026 | Plugins

Attack Vectors

WPBookit (slug: wpbookit) is affected by a High severity Stored Cross-Site Scripting issue (CVE-2026-1945) in versions up to and including 1.0.8. The core risk is that an unauthenticated attacker can submit malicious content through the wpb_user_name and wpb_user_email parameters and have it stored by the site.

Because this attack does not require a login (CVSS shows PR:N) and can be delivered over the network (AV:N), it is well-suited to opportunistic scanning and mass exploitation. Once the payload is stored, it can execute later when staff or customers load the affected page(s), without any obvious warning.

Security Weakness

The weakness is insufficient input sanitization and output escaping in WPBookit versions <= 1.0.8, allowing attacker-controlled values to be stored and then displayed in a way that the browser interprets as active script. Wordfence reports the affected inputs as wpb_user_name and wpb_user_email, which are commonly treated as “safe” fields but can still carry harmful content if not properly handled.

This is a stored XSS issue with a changed security scope (CVSS S:C), meaning impact can extend beyond the immediate component where the data was entered. In business terms: content submitted in one place can later affect other parts of the user experience where that data is shown.

Technical or Business Impacts

If exploited, this vulnerability can lead to unauthorized actions within a victim’s browser session, manipulation of what users see on your site, and exposure of limited sensitive information (CVSS indicates C:L and I:L). For executives and compliance teams, the bigger concern is how quickly these incidents become customer-trust and brand problems: injected scripts can change page content, add fraudulent messages, or redirect users in ways that look like your organization is endorsing it.

Marketing and revenue impacts can include damage to campaign landing pages, decreased conversion due to visible defacement or suspicious behavior, and reputational harm if customers report malicious popups or altered content. Operationally, incident response time increases because the malicious content can remain embedded until found and removed, and it may affect multiple pages where the stored fields are displayed.

Remediation is straightforward: update WPBookit to version 1.0.9 or newer patched releases, as advised by the source (Wordfence vulnerability record). Also track the official CVE entry for reference and reporting (CVE-2026-1945).

Similar Attacks

Stored XSS is a common pattern in WordPress ecosystem incidents, often used to inject spam, redirects, or credential-harvesting content into legitimate pages. Here are a few well-known, real-world examples of web and WordPress-related XSS issues (for context on the class of risk):

CVE-2018-6389 (WordPress) — Frequently discussed as part of broader WordPress security conversations and illustrates how public-facing weaknesses can be widely scanned and exploited.

CVE-2020-11022 (jQuery) — A widely used web library issue that demonstrated how XSS in common components can cascade into business impact across many sites.

CVE-2019-11358 (jQuery) — Another prominent web ecosystem example showing how injection-style flaws can be leveraged in real attacks when vulnerable code is present.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers