Customer Reviews for WooCommerce Vulnerability (High) – CVE-2026-1316

Customer Reviews for WooCommerce Vulnerability (High) – CVE-2026-1316

by | Feb 12, 2026 | Plugins

Attack Vectors

CVE-2026-1316 is a High severity vulnerability (CVSS 7.2) affecting the Customer Reviews for WooCommerce WordPress plugin (slug: customer-reviews-woocommerce) in versions up to and including 5.97.0.

The primary attack path is an unauthenticated Stored Cross-Site Scripting (XSS) injection via the media[].href parameter. If the plugin setting “Enable for Guests” is enabled, an attacker can submit malicious content without logging in, and the injected script can execute later when someone views the affected page.

This matters to business leaders because it turns routine customer-facing content (reviews and related media links) into a potential delivery mechanism for brand-damaging or fraud-enabling scripts—without requiring attackers to compromise an account first.

Security Weakness

The issue stems from insufficient input sanitization and output escaping of the media[].href parameter within Customer Reviews for WooCommerce (through version 5.97.0). That weakness can allow untrusted input to be stored and later rendered in a way that executes as script in a visitor’s browser.

Because this is a stored XSS scenario, the malicious payload can persist and repeatedly impact users who view the injected content. The risk is heightened when guest submissions are allowed, because it reduces friction for attackers and makes abuse easier to scale.

Technical or Business Impacts

For marketing directors and executives, the practical risk is that an attacker can use injected scripts to manipulate on-site experiences (such as altering what users see), misdirect traffic, or create convincing on-site prompts that damage trust and conversion performance.

From a business-risk standpoint, impacts can include brand and reputation harm, loss of customer trust, and potential compliance concerns if user interactions are influenced or data is exposed through the browser during a compromised session (the CVSS vector indicates cross-site impact and low complexity for remote exploitation).

Remediation: Update Customer Reviews for WooCommerce to version 5.98.0 or newer patched versions. Reference: Wordfence vulnerability advisory. CVE record: CVE-2026-1316.

Similar Attacks

Stored XSS has repeatedly been used in the wild to compromise legitimate sites and then leverage that trust to impact visitors. Examples include widely reported cases such as Wordfence reporting on XSS leading to site compromise and major platform security advisories on XSS risks in web applications (e.g., OWASP: Cross Site Scripting (XSS)). These illustrate how XSS can quickly become a brand, trust, and fraud problem—not just a technical issue.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers