UNKNOWN (0.0)
    Plugin

    Stored Cross-Site Scripting in MyQtip Plugin via Shortcode

    Published Date: 3/7/2026
    CVE ID: CVE-2026-1574

    Summary

    The MyQtip plugin for WordPress is affected by a stored cross-site scripting (XSS) vulnerability. This issue arises from inadequate input sanitization and output escaping in the `myqtip` shortcode, allowing authenticated contributors to inject malicious scripts into web pages.

    Vulnerability Details

    The MyQtip plugin up to version 2.0.5 is vulnerable to stored cross-site scripting due to improper handling of user-provided attributes in the `myqtip` shortcode. This defect enables attackers with at least contributor-level permissions to insert arbitrary JavaScript code into WordPress pages or posts. When another user views these corrupted pages, the injected scripts can execute. Such a vulnerability can lead to unauthorized actions being performed on behalf of the affected users or theft of user credentials and session tokens. Authentication is a prerequisite for exploiting this vulnerability, as attackers need the ability to create or edit content. The exploitation of such vulnerabilities could severely compromise data integrity and privacy on the affected websites.

    Recommendations

    Website administrators should restrict plugin usage to trusted contributors to diminish the potential risk. Apply role-based access control (RBAC) and use input validation libraries or tools to ensure proper sanitization and encoding of user input. Regularly update and audit plugins to identify and mitigate security issues.

    Available Fixes

    Last Updated: 3/10/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More