Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0594: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mallsop List Site Contributors

0
Medium
VulnerabilityCVE-2026-0594cvecve-2026-0594cwe-79
Published: Wed Jan 14 2026 (01/14/2026, 05:28:02 UTC)
Source: CVE Database V5
Vendor/Project: mallsop
Product: List Site Contributors

Description

CVE-2026-0594 is a reflected Cross-Site Scripting (XSS) vulnerability in the List Site Contributors WordPress plugin (versions up to 1. 1. 8). It arises from improper input sanitization and output escaping of the 'alpha' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the user's browser. The vulnerability has a CVSS score of 6. 1 (medium severity) and impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with public-facing contributor lists. Mitigation involves updating the plugin once a patch is available or applying manual input validation and output encoding.

AI-Powered Analysis

AILast updated: 01/14/2026, 06:05:23 UTC

Technical Analysis

CVE-2026-0594 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the List Site Contributors plugin for WordPress, specifically affecting versions up to and including 1.1.8. The vulnerability stems from improper neutralization of input during web page generation, classified under CWE-79. The 'alpha' parameter is not sufficiently sanitized or escaped before being reflected in the web page output, allowing an unauthenticated attacker to craft a malicious URL containing executable JavaScript code. When a victim clicks this link, the injected script executes in the context of the victim's browser session, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS v3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change due to impact on confidentiality and integrity but not availability. No known exploits have been reported in the wild as of the publication date. The plugin is used to list contributors on WordPress sites, which are common in community, e-commerce, and content-driven websites. The vulnerability's exploitation could undermine user trust and lead to data leakage or unauthorized actions within affected sites.

Potential Impact

For European organizations, the impact of CVE-2026-0594 can be significant, particularly for those relying on WordPress sites with the List Site Contributors plugin installed. Exploitation could lead to theft of user credentials, session tokens, or other sensitive information, compromising user accounts and potentially allowing attackers to escalate privileges or perform unauthorized transactions. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations due to data leakage), and cause operational disruptions if attackers leverage stolen credentials for further attacks. Public-facing websites with high user interaction or e-commerce functionality are especially vulnerable. Although availability is not directly impacted, the confidentiality and integrity breaches can have cascading effects on business continuity and customer trust. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

1. Monitor for an official patch or update from the plugin vendor and apply it promptly once available. 2. Until a patch is released, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the 'alpha' parameter. 3. Employ strict input validation and output encoding on the 'alpha' parameter within the plugin code if feasible, to neutralize malicious scripts. 4. Educate users and administrators about the risks of clicking untrusted links, especially those referencing the affected plugin's parameters. 5. Conduct regular security audits and vulnerability scans on WordPress sites to identify outdated or vulnerable plugins. 6. Consider disabling or replacing the List Site Contributors plugin with a more secure alternative if immediate patching is not possible. 7. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 8. Monitor logs for suspicious activities that may indicate attempted exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-04T20:45:34.251Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e018330e067168f4036

Added to database: 1/14/2026, 5:47:45 AM

Last enriched: 1/14/2026, 6:05:23 AM

Last updated: 1/14/2026, 7:08:47 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats