WordPress Vulnerability (Medium) –

WordPress Vulnerability (Medium) –

by | Mar 11, 2026 | Core

Attack Vectors

This Medium-severity vulnerability (CVSS 4.4) affects WordPress (slug: wordpress) versions up to and including 6.9.1, and involves Stored Cross-Site Scripting (XSS) through navigation menu items configured in the admin interface.

To exploit it, an attacker must already be authenticated with Administrator (or higher) permissions. The injected script is then stored and can execute when someone later visits a page where the compromised navigation menu item is rendered.

Exposure is limited to specific configurations: it only affects multi-site installations and installations where unfiltered_html has been disabled.

Security Weakness

The root issue is insufficient input sanitization and output escaping in WordPress Core when handling certain admin-controlled settings related to navigation menu items. This allows stored, attacker-supplied web scripts to be saved and later executed in users’ browsers.

Even though exploitation requires Administrator-level access, this is still a meaningful business risk because admin accounts are high-value targets (phishing, credential reuse, or internal misuse). In regulated environments, the affected configurations (multi-site and/or restricted HTML) are common, which can increase real-world relevance.

Remediation: Update WordPress to a patched version. Wordfence recommends upgrading to 6.8.4, 6.9.2, or any newer patched release.

Technical or Business Impacts

If exploited, stored scripts can run in the context of your site for any user who loads the impacted page(s). Depending on what the script does and who views the page, this can lead to session-related abuse, unauthorized actions performed in a user’s browser, content manipulation, or collection of data visible to that user.

From a business perspective, the most common outcomes are brand and trust damage (defaced navigation or unexpected pop-ups), increased risk of account compromise (especially if an injected script is used to capture session tokens or redirect users), and compliance exposure if the incident is deemed a security event affecting customer or employee accounts.

Similar Attacks (real examples): Stored XSS has been used in major platform compromises, including the Magecart web skimming campaigns (malicious JavaScript injected into websites to steal data), and the MOVEit Transfer mass exploitation (where injected code enabled data theft at scale).

Source: Wordfence Threat Intelligence

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers