MEDIUM (6.1)
    Plugin

    Stored Cross-Site Scripting in Ibtana WordPress Website Builder Plugin

    Published Date: 3/31/2026
    CVE ID: CVE-2026-1834

    Summary

    The Ibtana – WordPress Website Builder plugin is affected by a Stored Cross-Site Scripting (XSS) vulnerability, allowing contributors and above to inject malicious scripts through the 'ive' shortcode. This vulnerability affects versions up to 1.2.5.7 and results from inadequate sanitization of input and insufficient output escaping.

    Vulnerability Details

    Stored Cross-Site Scripting is a type of vulnerability where malicious scripts are injected into websites, which then get stored and executed when victims access the infected page. In this case, the Ibtana plugin does not properly sanitize or escape inputs provided to the 'ive' shortcode, allowing an attacker with contributor-level access or higher to input arbitrary JavaScript or HTML into the pages. These scripts can then be used to perform unauthorized actions, such as session hijacking, defacing websites, or redirecting users to malicious sites. The vulnerability affects all plugin versions up to and including 1.2.5.7. This issue poses significant risk as it can be exploited by insiders or attackers with minimal access, given the ease of acquiring contributor roles.

    Recommendations

    To mitigate this vulnerability, restrict contributor access to trusted users only and regularly audit roles and capabilities on your WordPress instance. Additionally, use a web application firewall (WAF) to detect and prevent XSS attacks and consider implementing content security policies (CSP) to reduce risk of script execution.

    Available Fixes

    Last Updated: 4/1/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More