iXML – Google XML sitemap generator Vulnerability (Medium) – CVE-20…

iXML – Google XML sitemap generator Vulnerability (Medium) – CVE-20…

by | Feb 18, 2026 | Plugins

Attack Vectors

The iXML – Google XML sitemap generator plugin (versions up to and including 0.6) has a Medium-severity vulnerability (CVSS 6.1) identified as CVE-2025-14076. It is a reflected cross-site scripting (XSS) issue triggered via the iXML_email parameter.

This attack typically relies on social engineering: an attacker crafts a link containing malicious input and convinces a staff member (for example, someone in Marketing, Finance, or Compliance) to click it or otherwise interact with it. No login is required for the attacker, but user interaction is required for the script to run.

Security Weakness

The underlying weakness is insufficient input sanitization and output escaping in how the plugin handles the iXML_email parameter. When user-supplied data is reflected back into a page without proper handling, it can allow an attacker’s script to be executed in the victim’s browser.

Because this is reflected XSS (rather than stored), the risk is often tied to how frequently targeted users can be induced to click links from email, messaging platforms, ads, or spoofed partner communications—common channels for business teams.

Technical or Business Impacts

For executives and business owners, the practical risk is not “a bug in a plugin,” but the potential for brand and operational harm if an attacker can run scripts in a user’s browser during a trusted WordPress interaction. Depending on the context of the affected page and the user who is tricked, impacts can include exposure of limited sensitive information, unauthorized actions performed in the user’s session, and disruption to business workflows.

From a marketing and customer-trust perspective, reflected XSS can be used in convincing phishing or redirection scenarios that damage brand credibility. From a compliance perspective, any incident involving unauthorized access or exposure of data—even if limited—can trigger internal reporting obligations, contractual notifications, or increased audit scrutiny.

There is currently no known patch available. Based on your organization’s risk tolerance, strong mitigations may include uninstalling iXML – Google XML sitemap generator and replacing it with an alternative, reviewing where and how the plugin is used, and increasing monitoring for suspicious links and unusual user activity. Reference: CVE-2025-14076 and the originating advisory source Wordfence vulnerability record.

Similar Attacks

Reflected XSS has been used broadly in real-world incidents to trick users into clicking weaponized links and executing scripts in trusted web contexts. Public examples include the MySpace “Samy” XSS worm (a landmark case showing how quickly script injection can spread) and major web platform XSS incidents such as the 2005 Samy worm coverage on Wikipedia: https://en.wikipedia.org/wiki/Samy_(computer_worm).

For additional context on how XSS is exploited and why it matters to organizations, see OWASP’s XSS overview: https://owasp.org/www-community/attacks/xss/.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers