WP NG Weather Vulnerability (Medium) – CVE-2026-1822

WP NG Weather Vulnerability (Medium) – CVE-2026-1822

by | Mar 20, 2026 | Plugins

Attack Vectors

WP NG Weather (slug: wp-ng-weather) is affected by a Medium-severity vulnerability (CVSS 6.4) tracked as CVE-2026-1822. The issue is a Stored Cross-Site Scripting (XSS) vulnerability that can be triggered through the plugin’s ng-weather shortcode when user-supplied shortcode attributes are accepted without sufficient safeguards.

The attacker needs an authenticated WordPress account with Contributor-level permissions or higher. In many organizations, this includes internal staff, agencies, freelancers, or partners who can submit or edit content. An attacker can place a malicious payload into a page or post that uses the shortcode, and the injected script can then run whenever someone views that content.

Because this is a stored issue, it can persist in published pages and campaign landing pages until discovered and removed—making it especially relevant for marketing teams that publish time-sensitive content quickly and at scale.

Security Weakness

The weakness stems from insufficient input sanitization and output escaping on user-controlled shortcode attributes in WP NG Weather versions up to and including 1.0.9. In practical terms, this means the plugin can allow certain untrusted values to be saved and later rendered to site visitors in a way that the browser interprets as active script.

This is a common class of WordPress plugin vulnerability: shortcodes are widely used in page content, and when attributes are not properly handled, they can become an injection point. The risk is elevated when many people have content access and when content workflows rely on contributors to draft and publish marketing assets.

Remediation note: Per the published advisory, there is no known patch available at this time. That changes the risk conversation from “update and move on” to “mitigate, replace, or remove.”

Technical or Business Impacts

If exploited, Stored XSS can lead to business-impacting outcomes such as:

Brand and customer trust damage: Visitors could see unexpected redirects, pop-ups, or altered on-page content on high-traffic marketing pages. Even a short-lived incident can create reputational harm and increase support burden.

Account and session risk: Scripts running in a user’s browser can potentially interact with what that user can access in WordPress. This raises the possibility of follow-on actions performed in the context of logged-in users (for example, staff who routinely review and approve content).

Campaign and revenue disruption: Affected landing pages could be manipulated to degrade conversion rates, alter tracking behavior, or misroute leads—undermining attribution, pipeline accuracy, and ROI reporting.

Compliance and incident response costs: Depending on your environment and data flows, injected scripts may increase privacy and compliance exposure, and can trigger internal incident response processes, legal review, and external communications.

Recommended actions (given no known patch): Consider uninstalling WP NG Weather and replacing it with a safer alternative. If immediate removal is not feasible, limit Contributor access, review content for use of the ng-weather shortcode, and implement compensating controls aligned to your organization’s risk tolerance (for example, tighter publishing workflows and enhanced monitoring).

Similar Attacks

Stored XSS in WordPress plugins has repeatedly been used to compromise sites through routine content workflows. For additional context, here are a few real, public examples and references:

Elementor Pro: Stored XSS vulnerabilities patched (Wordfence)

ThemeGrill Demo Importer: critical vulnerability chain including stored XSS (Wordfence)

Social Warfare plugin vulnerability discussion (Wordfence)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers