Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0627: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mohammed_kaludi AMP for WP – Accelerated Mobile Pages

0
Medium
VulnerabilityCVE-2026-0627cvecve-2026-0627cwe-79
Published: Fri Jan 09 2026 (01/09/2026, 08:20:46 UTC)
Source: CVE Database V5
Vendor/Project: mohammed_kaludi
Product: AMP for WP – Accelerated Mobile Pages

Description

CVE-2026-0627 is a stored cross-site scripting (XSS) vulnerability in the AMP for WP – Accelerated Mobile Pages WordPress plugin, affecting all versions up to 1. 1. 10. The flaw arises from improper sanitization of SVG file uploads, where only <script> tags are removed but other XSS vectors like event handlers and foreignObject elements remain. Authenticated users with Author-level or higher privileges can upload malicious SVG files containing scripts that execute when viewed by other users. This vulnerability can lead to limited confidentiality and integrity impacts, such as session hijacking or unauthorized actions performed in the context of affected users. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity but requiring authenticated access. European organizations using this plugin on WordPress sites are at risk, especially those with multiple authors or contributors. Mitigation involves restricting SVG uploads, applying strict SVG sanitization beyond script tag removal, and limiting user roles that can upload files.

AI-Powered Analysis

AILast updated: 01/16/2026, 10:07:02 UTC

Technical Analysis

CVE-2026-0627 is a stored cross-site scripting vulnerability identified in the AMP for WP – Accelerated Mobile Pages plugin for WordPress, affecting all versions up to and including 1.1.10. The vulnerability stems from insufficient sanitization of SVG file uploads. While the plugin removes <script> tags from SVG content, it fails to neutralize other XSS attack vectors embedded within SVG files, such as event handler attributes (e.g., onload, onerror, onmouseover), foreignObject elements, and SVG animation attributes. This incomplete sanitization allows an authenticated attacker with Author-level or higher privileges to upload a crafted SVG file containing malicious JavaScript code. When other users view the uploaded SVG file, the malicious script executes in their browsers, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress site. The attack requires no user interaction beyond viewing the SVG file and can be exploited remotely over the network. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with the vector string AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N. This means the attack is network-based, has low complexity, requires privileges (Author or higher), no user interaction, and impacts confidentiality and integrity with a scope change. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to sites using this plugin, especially multi-author blogs or sites with frequent content uploads. The lack of a patch link suggests that users must apply manual mitigations or await an official update.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized script execution within trusted WordPress environments, compromising user sessions and potentially allowing attackers to perform actions on behalf of legitimate users. This can result in data leakage, defacement, or further compromise of the website and its users. Organizations relying on the AMP for WP plugin for SEO and mobile performance may face reputational damage and loss of user trust if exploited. The requirement for Author-level access limits the attack surface but does not eliminate risk, especially in collaborative environments where multiple users have elevated privileges. The vulnerability's impact on confidentiality and integrity is moderate, with no direct availability impact. Given the widespread use of WordPress and AMP plugins in Europe, especially in sectors like media, e-commerce, and public services, the threat is significant. Attackers could leverage this vulnerability to target European users or organizations by injecting malicious scripts that harvest credentials or deliver further payloads.

Mitigation Recommendations

European organizations should immediately audit user roles and restrict SVG file upload permissions to only trusted administrators where possible. Implement stricter SVG sanitization tools that remove or neutralize all potentially dangerous elements and attributes beyond just <script> tags, such as event handlers and foreignObject elements. Consider disabling SVG uploads entirely if not essential. Monitor and review uploaded SVG files for suspicious content. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of XSS attacks. Keep WordPress core, themes, and plugins up to date, and watch for official patches from the AMP for WP plugin vendor. Educate content authors about the risks of uploading untrusted files. Use web application firewalls (WAFs) with rules targeting SVG-based XSS payloads. Finally, implement regular security scans and penetration tests focusing on file upload functionalities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-05T22:04:46.579Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960bf3fecefc3cd7c1371c8

Added to database: 1/9/2026, 8:41:35 AM

Last enriched: 1/16/2026, 10:07:02 AM

Last updated: 2/6/2026, 5:58:50 PM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats