MEDIUM (6.3)
    Core

    Stored Cross-Site Scripting Vulnerability in Acato WP REST Cache

    Published Date: 3/25/2026
    CVE ID: CVE-2026-25347

    Summary

    The WordPress plugin 'WP REST Cache' contains a stored XSS vulnerability, identified as CVE-2026-25347, which affects versions up to and including 2026.1.0. This vulnerability allows an attacker to inject malicious scripts that could be executed in user sessions.

    Vulnerability Details

    CVE-2026-25347 is a stored cross-site scripting (XSS) vulnerability found in the Acato WP REST Cache plugin for WordPress. The flaw arises due to improper neutralization of input during web page generation. Attackers can exploit this vulnerability to inject malicious JavaScript code into cached REST API responses. When an unsuspecting user accesses a compromised page, the script runs in their browser with the permissions granted to the WordPress site. This could lead to various attacks, including session hijacking, defacement, or distribution of malware. Such vulnerabilities are particularly concerning on sites with sensitive user data or high traffic, as they can compromise the integrity and confidentiality of user interactions.

    Recommendations

    To mitigate the impact of this vulnerability, administrators should ensure they are using the latest version of all WordPress plugins and regularly audit installed plugins for known security issues. Implement Content Security Policy (CSP) headers to minimize the potential effects of XSS attacks. Regularly back up site data and consider employing a Web Application Firewall (WAF) to block malicious payloads targeting XSS vulnerabilities.

    Available Fixes

    Last Updated: 3/28/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More