uberSlider_classic Vulnerability (Medium) – CVE-2026-28102

uberSlider_classic Vulnerability (Medium) – CVE-2026-28102

by | Mar 5, 2026 | Plugins

Attack Vectors

UberSlider Classic (slug: uberSlider_classic) versions 2.5 and earlier are affected by a Medium-severity Reflected Cross-Site Scripting (XSS) vulnerability (CVE-2026-28102, CVSS 6.1). Reflected XSS typically relies on an attacker sending a specially crafted link or request that causes a website to reflect malicious content back to the visitor’s browser.

In practical terms, an attacker may try to trick a member of your organization (for example, a marketing manager, executive assistant, or an administrator) into clicking a link delivered via email, chat, social media message, or a spoofed vendor communication. If the user interacts with the link while browsing your WordPress site, the injected script can run in their browser in the context of your domain.

Security Weakness

This issue stems from insufficient input sanitization and output escaping in UberSlider Classic <= 2.5, allowing attacker-supplied content to be returned in a web page without being safely handled. Because the vulnerability is reflected, it generally requires user interaction (such as clicking a link) for the malicious script to execute.

While this is not typically a “silent” compromise by itself, it is a meaningful weakness for organizations with public-facing sites, active marketing campaigns, or frequent inbound communications. It can also undermine trust signals that marketing and compliance teams work hard to maintain.

Technical or Business Impacts

Reflected XSS can create tangible business risk even at Medium severity. Potential impacts include brand and customer trust damage if visitors are redirected, shown deceptive prompts, or exposed to malicious content that appears to come from your official site. This can be especially harmful during campaign launches, product announcements, or high-traffic seasonal periods.

From an operational perspective, this type of issue can enable session or account-targeting scenarios depending on what the victim is doing at the time (for example, browsing while logged in). It can also increase the likelihood of secondary incidents such as credential theft through convincing on-site impersonation, and it may trigger compliance concerns if it contributes to unauthorized access or data exposure.

Remediation note: There is no known patch available for UberSlider Classic <= 2.5 per the reported advisory. Based on your organization’s risk tolerance, it may be best to uninstall the affected plugin and replace it with a maintained alternative. For reference, see the official CVE record at https://www.cve.org/CVERecord?id=CVE-2026-28102 and the source advisory at Wordfence vulnerability entry.

Similar Attacks

Reflected XSS is a long-standing web attack technique that has been used in many real-world incidents. Examples include the MySpace “Samy” worm (XSS-driven propagation): https://en.wikipedia.org/wiki/Samy_(computer_worm), and widely reported XSS vulnerabilities in major platforms such as eBay: https://www.bbc.com/news/technology-23059734.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers