Sphere Manager Vulnerability (Medium) – CVE-2026-1905

Sphere Manager Vulnerability (Medium) – CVE-2026-1905

by | Feb 13, 2026 | Plugins

Attack Vectors

Sphere Manager (slug: sphere-manager) versions 1.0.2 and earlier are affected by a Medium severity vulnerability (CVSS 6.4, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) tracked as CVE-2026-1905.

The primary attack path is an authenticated user who already has at least Contributor-level access. That user can add or edit content that includes the show_sphere_image shortcode and manipulate the width attribute to inject script content.

Because this is a stored Cross-Site Scripting (XSS) issue, the malicious content can remain embedded in a page or post and execute whenever anyone visits the affected page—potentially including executives, marketing teams, customers, and administrators.

Security Weakness

Wordfence reports that Sphere Manager is vulnerable due to insufficient input sanitization and output escaping of the width parameter in the show_sphere_image shortcode in versions up to and including 1.0.2.

This means user-supplied values can be stored and later rendered in a way that allows a browser to interpret injected content as active script, rather than as plain text.

No known patch is currently available. Organizations should review the advisory and decide on mitigations that match their risk tolerance, which may include removing the plugin and replacing it with a safer alternative.

Technical or Business Impacts

While this issue does not require a user to click a link (UI:N), it does require that an attacker has at least Contributor access (PR:L). For many organizations, that is still a realistic risk due to shared accounts, third-party contributors, agency access, or compromised credentials.

Potential business impacts include brand and campaign disruption (unauthorized scripts embedded on high-traffic pages), loss of visitor trust, and compliance exposure if malicious scripts are used to capture or misuse data displayed in the browser.

Because the scope is changed (S:C), the impact can extend beyond a single page’s content into broader user sessions and workflows in the browser. This can increase the risk of unauthorized actions performed under a legitimate user’s session, including marketing and website administration tasks.

With no known patch available, risk owners (CEO, COO, CFO, and Compliance) should evaluate compensating controls such as restricting who can publish or edit content, tightening access reviews, and prioritizing replacement or removal of the affected plugin where feasible.

Similar Attacks

Stored XSS vulnerabilities in widely used web platforms have been exploited in real-world incidents. Examples include:

Apple iOS/iPadOS CVE-2021-30860 (“FORCEDENTRY”) advisory (CISA)
Apache Log4j CVE-2021-44228 advisory (CISA)
Microsoft Exchange Server vulnerabilities exploited in the wild (CISA)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers