MEDIUM (5.0)
    Plugin

    Stored XSS Vulnerability in WP Shortcodes Plugin - Shortcodes Ultimate via su_carousel

    Published Date: 4/4/2026
    CVE ID: CVE-2026-0738

    Summary

    The Shortcodes Ultimate plugin for WordPress is vulnerable to stored cross-site scripting through the su_carousel shortcode. This vulnerability affects all versions up to 7.4.8 and allows an authenticated user with author-level access or higher to execute arbitrary scripts on pages.

    Vulnerability Details

    The Stored Cross-Site Scripting (XSS) vulnerability in the Shortcodes Ultimate plugin arises from insufficiently sanitized input and poorly escaped output in the 'su_slide_link' attachment meta field. This flaw exists in all plugin versions up to and including 7.4.8. An authenticated attacker with author permission or higher can inject malicious web scripts through the su_carousel shortcode. Once embedded, these scripts will execute whenever the infected page is accessed by other users, potentially leading to hijacked sessions, defaced web pages, or stolen credentials. Such vulnerabilities are serious as they exploit client-side languages such as JavaScript, which are integral for interactive web functionalities. Stored XSS is particularly dangerous as it can impact all users who view the compromised content, including administrators.

    Recommendations

    To mitigate this vulnerability, ensure that the WordPress environment is updated regularly. Apply a web application firewall (WAF) to detect and block malicious requests. Restrict unnecessary user permissions and limit the use of third-party plugins. Educate users, especially those with author-level or higher access, about common XSS attack vectors.

    Available Fixes

    Last Updated: 4/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More