CVE-2026-0627: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
The AMP for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 1.1.10. This is due to insufficient sanitization of SVG file content that only removes `<script>` tags while allowing other XSS vectors such as event handlers (onload, onerror, onmouseover), foreignObject elements, and SVG animation attributes. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts via malicious SVG file uploads that will execute whenever a user views the uploaded file.
AI Analysis
Technical Summary
CVE-2026-0627 is a stored cross-site scripting vulnerability classified under CWE-79, found in the AMP for WP – Accelerated Mobile Pages plugin for WordPress, maintained by mohammed_kaludi. The vulnerability exists in all versions up to and including 1.1.10. It stems from improper sanitization of SVG file uploads, where the plugin only removes <script> tags but fails to neutralize other XSS attack vectors embedded within SVG content, such as event handler attributes (e.g., onload, onerror, onmouseover), foreignObject elements, and SVG animation attributes. This allows an authenticated attacker with Author-level or higher privileges to upload a crafted SVG file containing malicious JavaScript. When other users view the uploaded SVG file, the malicious script executes in their browsers, potentially leading to session hijacking, data theft, or unauthorized actions within the context of the affected site. The vulnerability requires no user interaction beyond viewing the SVG file and has a CVSS 3.1 base score of 6.4, indicating medium severity. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the attacker’s privileges. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risks of insufficient input sanitization in web applications handling complex file formats like SVG, which can embed executable code in multiple ways beyond simple script tags.
Potential Impact
This vulnerability can lead to unauthorized script execution in the context of affected websites, compromising user confidentiality and data integrity. Attackers with Author-level access can leverage this to escalate privileges indirectly by targeting site administrators or other users with higher privileges who view the malicious SVG files. Potential impacts include session hijacking, theft of sensitive information, defacement, or unauthorized actions performed on behalf of legitimate users. Since the vulnerability is stored and triggers upon viewing, it can persistently affect multiple users. The availability of the site is not directly impacted. Organizations running WordPress sites with the AMP for WP plugin are at risk, especially those allowing multiple authors or contributors to upload media. The medium CVSS score reflects the moderate ease of exploitation (authenticated user required) and the significant impact on confidentiality and integrity. The lack of user interaction requirement beyond viewing increases the risk of widespread exploitation once malicious SVGs are uploaded.
Mitigation Recommendations
Immediate mitigation involves restricting SVG file uploads to trusted users only or disabling SVG uploads entirely until a patch is available. Implement additional server-side sanitization of SVG files using robust libraries that neutralize all executable content, including event handlers and foreignObject elements, not just <script> tags. Employ Content Security Policy (CSP) headers to restrict script execution origins and reduce the impact of XSS attacks. Regularly audit user privileges to minimize the number of users with Author-level or higher access. Monitor uploaded media files for suspicious content and remove any untrusted SVG files. Update the AMP for WP plugin promptly once the vendor releases a security patch addressing this vulnerability. Additionally, educate site administrators and users about the risks of uploading complex file types and encourage the use of safer image formats where possible.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, Brazil, France, Japan, Netherlands
CVE-2026-0627: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
Description
The AMP for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 1.1.10. This is due to insufficient sanitization of SVG file content that only removes `<script>` tags while allowing other XSS vectors such as event handlers (onload, onerror, onmouseover), foreignObject elements, and SVG animation attributes. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts via malicious SVG file uploads that will execute whenever a user views the uploaded file.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-0627 is a stored cross-site scripting vulnerability classified under CWE-79, found in the AMP for WP – Accelerated Mobile Pages plugin for WordPress, maintained by mohammed_kaludi. The vulnerability exists in all versions up to and including 1.1.10. It stems from improper sanitization of SVG file uploads, where the plugin only removes <script> tags but fails to neutralize other XSS attack vectors embedded within SVG content, such as event handler attributes (e.g., onload, onerror, onmouseover), foreignObject elements, and SVG animation attributes. This allows an authenticated attacker with Author-level or higher privileges to upload a crafted SVG file containing malicious JavaScript. When other users view the uploaded SVG file, the malicious script executes in their browsers, potentially leading to session hijacking, data theft, or unauthorized actions within the context of the affected site. The vulnerability requires no user interaction beyond viewing the SVG file and has a CVSS 3.1 base score of 6.4, indicating medium severity. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the attacker’s privileges. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risks of insufficient input sanitization in web applications handling complex file formats like SVG, which can embed executable code in multiple ways beyond simple script tags.
Potential Impact
This vulnerability can lead to unauthorized script execution in the context of affected websites, compromising user confidentiality and data integrity. Attackers with Author-level access can leverage this to escalate privileges indirectly by targeting site administrators or other users with higher privileges who view the malicious SVG files. Potential impacts include session hijacking, theft of sensitive information, defacement, or unauthorized actions performed on behalf of legitimate users. Since the vulnerability is stored and triggers upon viewing, it can persistently affect multiple users. The availability of the site is not directly impacted. Organizations running WordPress sites with the AMP for WP plugin are at risk, especially those allowing multiple authors or contributors to upload media. The medium CVSS score reflects the moderate ease of exploitation (authenticated user required) and the significant impact on confidentiality and integrity. The lack of user interaction requirement beyond viewing increases the risk of widespread exploitation once malicious SVGs are uploaded.
Mitigation Recommendations
Immediate mitigation involves restricting SVG file uploads to trusted users only or disabling SVG uploads entirely until a patch is available. Implement additional server-side sanitization of SVG files using robust libraries that neutralize all executable content, including event handlers and foreignObject elements, not just <script> tags. Employ Content Security Policy (CSP) headers to restrict script execution origins and reduce the impact of XSS attacks. Regularly audit user privileges to minimize the number of users with Author-level or higher access. Monitor uploaded media files for suspicious content and remove any untrusted SVG files. Update the AMP for WP plugin promptly once the vendor releases a security patch addressing this vulnerability. Additionally, educate site administrators and users about the risks of uploading complex file types and encourage the use of safer image formats where possible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-05T22:04:46.579Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960bf3fecefc3cd7c1371c8
Added to database: 1/9/2026, 8:41:35 AM
Last enriched: 2/26/2026, 6:31:25 PM
Last updated: 3/26/2026, 3:29:15 AM
Views: 182
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.