MEDIUM (6.5)
    Plugin

    Stored XSS Vulnerability in Social Rocket Plugin via 'id' Parameter

    Published Date: 4/23/2026
    CVE ID: CVE-2026-1923

    Summary

    The Social Rocket – Social Sharing Plugin for WordPress is affected by a stored Cross-Site Scripting (XSS) vulnerability. This flaw allows authenticated users with Subscriber-level access or higher to inject arbitrary JavaScript into pages, potentially impacting site visitors and other users.

    Vulnerability Details

    This stored XSS vulnerability in the Social Rocket plugin arises from insufficient input sanitization and improper output escaping. The vulnerability exists in versions up to and including 1.3.4.2 and is exploitable via the 'id' parameter. Because the plugin fails to adequately sanitize inputs, a malicious actor can script and store harmful payloads, which are subsequently executed in the browser of any user who opens the affected page. Stored XSS attacks can lead to cookie theft, session hijacking, or the injection of other malicious scripts, potentially compromising user accounts and sensitive website content. Given that this attack vector is accessible to users with even minimal access permissions, it poses a significant security risk.

    Recommendations

    To mitigate the risks from this vulnerability, restrict site access to trusted users only and regularly audit user roles to minimize unnecessary privileges. Implement Web Application Firewall (WAF) rules to filter out malicious input and increase the security of your site's input validation processes, focusing especially on input that could potentially be used to craft XSS attacks.

    Available Fixes

    Last Updated: 4/25/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More