MEDIUM (6.7)
    Plugin

    Stored Cross-Site Scripting Vulnerability in NextMove Lite Plugin for WordPress

    Published Date: 5/2/2026
    CVE ID: CVE-2026-0703

    Summary

    The NextMove Lite – Thank You Page for WooCommerce plugin is vulnerable to stored cross-site scripting (XSS) via its 'xlwcty_current_date' shortcode. This vulnerability affects all versions up to and including 2.23.0 due to inadequate input sanitization and output escaping.

    Vulnerability Details

    This vulnerability stems from the plugin's failure to properly sanitize and escape user-provided input in the 'xlwcty_current_date' shortcode. As a result, an authenticated attacker with at least contributor-level access can inject malicious web scripts into webpages. When other users, including admins, visit these compromised pages, the injected scripts execute within their browser's context. This can lead to a range of security issues, including the theft of session tokens, credentials, and other sensitive information. The issue particularly poses a risk in environments where untrusted contributors have posting privileges. Ensuring that input handling mechanisms are robust and secure is essential in avoiding such vulnerabilities.

    Recommendations

    Limit the access of untrusted users, particularly those with contributor-level roles, as a temporary measure. Carefully review any plugins with similar functionalities to identify similar issues. Regularly update all plugins and ensure that all inputs, especially those involving user-generated content and shortcodes, are properly sanitized and escaped.

    Available Fixes

    Last Updated: 5/4/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More