MinhNhut Link Gateway Vulnerability (Medium) – CVE-2026-3333

MinhNhut Link Gateway Vulnerability (Medium) – CVE-2026-3333

by | Mar 20, 2026 | Plugins

Attack Vectors

CVE-2026-3333 is a medium-severity Stored Cross-Site Scripting (XSS) issue (CVSS 6.4) affecting the MinhNhut Link Gateway WordPress plugin (slug: minhnhut-link-gateway) in versions up to and including 3.6.1. It can be exploited by an authenticated user with Contributor-level access or higher.

The attack path is straightforward for any user who can create or edit content: the attacker places malicious code into attributes of the plugin’s “linkgate” shortcode. Because the payload is stored in the database as part of the post/page content, it can execute later when a visitor (or an internal user, such as a marketing manager or site administrator) loads the affected page.

This matters for marketing and business teams because Contributor access is commonly granted to internal staff, agencies, freelancers, or partner teams for publishing workflows—expanding the pool of accounts that could be abused if credentials are phished, reused, or otherwise compromised.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping for user-supplied shortcode attributes in the MinhNhut Link Gateway plugin’s linkgate shortcode. In practice, that means the plugin can accept dangerous input and later render it in a way that browsers interpret as executable script.

Stored XSS is especially risky in business contexts because it can execute in the context of trusted site pages—potentially impacting high-value workflows such as campaign landing pages, lead-capture forms, analytics tags, and administrator sessions.

As of the published advisory, there is no known patch available. Organizations should evaluate risk tolerance and apply compensating controls, which may include uninstalling the plugin and replacing it, tightening roles/permissions, and increasing content review for pages that use the shortcode.

Technical or Business Impacts

If exploited, this issue can lead to: theft of session data in some scenarios, unauthorized actions performed in a victim’s browser session, malicious redirects on marketing pages, defacement or hidden content injection, and damage to brand trust. It can also create compliance exposure if customer data collection flows are altered or if visitors are redirected to fraudulent destinations.

For marketing and revenue teams, the practical impacts can include: altered CTAs or forms (lost leads), injected competitor or scam links (brand harm), compromised analytics integrity (bad reporting and misallocated spend), and customer support escalation if visitors experience warnings or suspicious behavior on your site.

Recommended mitigations (given no known patch): consider removing/uninstalling MinhNhut Link Gateway (or disabling the shortcode if feasible), restricting or revalidating Contributor and above access (especially for third parties), enforcing strong authentication controls (unique passwords, MFA where possible), and auditing recent content edits for unexpected [linkgate] shortcode usage or unfamiliar attributes.

Reference: CVE-2026-3333. Additional details are available via the disclosed source: Wordfence vulnerability record.

Similar attacks (real-world examples): Stored XSS has been used broadly across platforms to hijack accounts and manipulate user sessions, including incidents such as the Samy MySpace worm, the TweetDeck XSS incident, and past session/token theft patterns enabled by XSS that can lead to account takeover and unauthorized actions.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers