High (7.2)

Wordpress XSS (CVE-2026-1843)

CVE-2026-1843

The Super Page Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Activity Log in all versions up to, and including, 5.2.2 due to insufficient input sanitization and outpu...

Affected: WordPress

Overview

A critical security flaw has been discovered in the Super Page Cache plugin for WordPress, affecting all versions up to and including 5.2.2. This vulnerability allows malicious actors to inject harmful code directly into your website, which is then served to unsuspecting visitors.

Vulnerability Details

This is a Stored Cross-Site Scripting (XSS) vulnerability located within the plugin’s Activity Log feature. Due to insufficient security checks on user input, an attacker can embed malicious JavaScript code. Unlike other flaws that require a user to click a link, this “stored” attack means the harmful code is permanently saved on the website. It automatically executes in the browser of any visitor who loads the compromised page.

Potential Impact

The severity of this vulnerability is rated HIGH with a CVSS score of 7.2. The primary risks include:

  • Session Hijacking: Attackers can steal administrator or user login cookies, potentially gaining full control of the WordPress site.
  • Website Defacement: Malicious scripts can alter the content displayed to your visitors.
  • Malware Distribution: Your site could be used to redirect users to malicious sites or deploy malware to their computers.
  • Data Theft: Injected scripts can capture keystrokes or sensitive data entered by users on the site.

Exploitation requires no authentication, meaning even unskilled attackers can easily target unpatched websites.

Remediation and Mitigation

Immediate action is required to secure affected websites.

  1. Update Immediately: The most critical step is to update the Super Page Cache plugin to the latest version (any release after 5.2.2). Plugin developers have released a patched version that properly sanitizes input and escapes output. Update via your WordPress admin dashboard (Dashboard > Updates).
  2. Verify and Cleanse: If you suspect your site was targeted, review your pages and posts for any suspicious content or unexpected behavior. Consider using a security plugin to scan for malware.
  3. General Best Practice: Maintain a routine of updating all WordPress plugins, themes, and the core itself. This is the single most effective practice to protect your website from known vulnerabilities.

Note: If you cannot update immediately, the only complete mitigation is to deactivate and remove the Super Page Cache plugin until you can install the secured version. Using a web application firewall (WAF) may help block exploitation attempts but should not be considered a permanent substitute for applying the update.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other WordPress Vulnerabilities

View all WordPress vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.