MEDIUM (6.9)
    Plugin

    Stored Cross-Site Scripting in WPFunnels Plugin via Shortcode

    Published Date: 4/4/2026
    CVE ID: CVE-2026-0626

    Summary

    The WPFunnels plugin is vulnerable to Stored Cross-Site Scripting through the 'wpf_optin_form' shortcode, allowing attackers with contributor-level access to inject scripts into pages. This flaw affects versions up to 3.7.9 and is due to insufficient sanitization of the 'button_icon' parameter.

    Vulnerability Details

    The Stored Cross-Site Scripting (XSS) vulnerability exists in the WPFunnels plugin for WordPress. Specifically, the vulnerability is found in versions up to and including 3.7.9, where the 'wpf_optin_form' shortcode fails to adequately sanitize and escape the 'button_icon' parameter. An authenticated attacker with at least contributor-level access can leverage this flaw to inject malicious scripts. These scripts are then executed in the context of other users viewing the compromised pages. This makes it possible to perform actions that could compromise user sessions, steal information, or deface pages. The vulnerability is critical as it exploits insufficient data handling and can affect site integrity and user trust.

    Recommendations

    To mitigate this vulnerability, site administrators should immediately restrict access to contributors who may exploit this until a patch is applied. Use output escaping functions for dynamic content and apply input validation to user inputs within the plugin. Regularly audit user roles and permissions to limit unnecessary access.

    Available Fixes

    Last Updated: 4/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More