Survey Vulnerability (Medium) – CVE-2026-1247

Survey Vulnerability (Medium) – CVE-2026-1247

by | Mar 20, 2026 | Plugins

Attack Vectors

CVE-2026-1247 is a Medium-severity stored cross-site scripting (XSS) issue (CVSS 4.4) affecting the Survey WordPress plugin (slug: survey) in versions 1.1 and below. The vulnerable path is the plugin’s admin settings, where insufficient input sanitization and output escaping can allow injected scripts to be stored and later executed.

This is an authenticated issue that requires administrator-level permissions or higher. While that reduces broad “internet-wide” exploitation, it increases relevance for organizations with multiple admins, shared admin accounts, agencies/contractors, or complex approval workflows where admin access is more widely distributed than intended.

Per the advisory, this vulnerability only affects (1) WordPress multisite installations and (2) installations where unfiltered_html has been disabled. In those affected environments, malicious script can execute when a user visits a page where the injected content is rendered.

Security Weakness

The core weakness is a lack of adequate input sanitization when saving plugin settings and insufficient output escaping when those settings are displayed. This combination enables stored XSS: the malicious content is saved in the database and then served to users later, rather than requiring a one-time “click” on a malicious link.

Because the payload executes in the context of your WordPress site, it can undermine trust in your brand experience and create a pathway for follow-on abuse (for example, manipulating what administrators or other users see in the WordPress dashboard or in site pages where the stored content is rendered).

There is no known patch available at the time of the referenced report. As a result, risk reduction depends on operational mitigations and decisions about whether the plugin is acceptable to keep in your environment given your organization’s risk tolerance and governance requirements.

Technical or Business Impacts

Brand and customer trust risk: Stored XSS can alter visible content, inject misleading messages, or interfere with user interactions. For marketing and customer-facing teams, this can translate into reputational damage and degraded campaign performance if pages are manipulated or behave unexpectedly.

Administrative integrity and operational risk: Since this issue is triggered via the Survey plugin’s settings and executes on page access, it can create persistent, hard-to-diagnose anomalies that waste staff time and increase incident-response overhead—especially on multisite networks with multiple site owners and administrators.

Compliance and governance exposure: Even when the CVSS score is medium, the presence of a known CVE (CVE-2026-1247) with no known patch can be difficult to justify during audits or vendor/security reviews, particularly for organizations that manage multiple brands or regulated data flows across a multisite environment.

Recommended response (risk-based): If your organization is impacted (multisite and/or unfiltered_html disabled) and the Survey plugin (≤ 1.1) is not business-critical, the safest route may be to uninstall the affected software and replace it. If removal is not immediately feasible, reduce exposure by limiting administrator access to only those who require it, reviewing admin accounts for over-provisioning, and increasing monitoring around WordPress administrative changes until a supported alternative is deployed.

Similar Attacks

Stored XSS in WordPress plugins is a common pattern and has been repeatedly used to alter site content and create persistent malicious behavior. For context, here are a few real examples of plugin-related XSS disclosures:

Elementor (Wordfence disclosure, 2021) – a widely publicized case showing how plugin flaws can create significant business risk on high-traffic sites.

WooCommerce Payments (Wordfence disclosure, 2022) – highlights how plugin vulnerabilities can impact ecommerce operations and trust.

WordPress plugin vulnerability exploitation campaigns (Wordfence, 2023) – illustrates how attackers routinely scan for and exploit known plugin weaknesses at scale.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers