Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0627: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mohammed_kaludi AMP for WP – Accelerated Mobile Pages

0
Medium
VulnerabilityCVE-2026-0627cvecve-2026-0627cwe-79
Published: Fri Jan 09 2026 (01/09/2026, 08:20:46 UTC)
Source: CVE Database V5
Vendor/Project: mohammed_kaludi
Product: AMP for WP – Accelerated Mobile Pages

Description

The AMP for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 1.1.10. This is due to insufficient sanitization of SVG file content that only removes `<script>` tags while allowing other XSS vectors such as event handlers (onload, onerror, onmouseover), foreignObject elements, and SVG animation attributes. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts via malicious SVG file uploads that will execute whenever a user views the uploaded file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:31:25 UTC

Technical Analysis

CVE-2026-0627 is a stored cross-site scripting vulnerability classified under CWE-79, found in the AMP for WP – Accelerated Mobile Pages plugin for WordPress, maintained by mohammed_kaludi. The vulnerability exists in all versions up to and including 1.1.10. It stems from improper sanitization of SVG file uploads, where the plugin only removes <script> tags but fails to neutralize other XSS attack vectors embedded within SVG content, such as event handler attributes (e.g., onload, onerror, onmouseover), foreignObject elements, and SVG animation attributes. This allows an authenticated attacker with Author-level or higher privileges to upload a crafted SVG file containing malicious JavaScript. When other users view the uploaded SVG file, the malicious script executes in their browsers, potentially leading to session hijacking, data theft, or unauthorized actions within the context of the affected site. The vulnerability requires no user interaction beyond viewing the SVG file and has a CVSS 3.1 base score of 6.4, indicating medium severity. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the attacker’s privileges. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risks of insufficient input sanitization in web applications handling complex file formats like SVG, which can embed executable code in multiple ways beyond simple script tags.

Potential Impact

This vulnerability can lead to unauthorized script execution in the context of affected websites, compromising user confidentiality and data integrity. Attackers with Author-level access can leverage this to escalate privileges indirectly by targeting site administrators or other users with higher privileges who view the malicious SVG files. Potential impacts include session hijacking, theft of sensitive information, defacement, or unauthorized actions performed on behalf of legitimate users. Since the vulnerability is stored and triggers upon viewing, it can persistently affect multiple users. The availability of the site is not directly impacted. Organizations running WordPress sites with the AMP for WP plugin are at risk, especially those allowing multiple authors or contributors to upload media. The medium CVSS score reflects the moderate ease of exploitation (authenticated user required) and the significant impact on confidentiality and integrity. The lack of user interaction requirement beyond viewing increases the risk of widespread exploitation once malicious SVGs are uploaded.

Mitigation Recommendations

Immediate mitigation involves restricting SVG file uploads to trusted users only or disabling SVG uploads entirely until a patch is available. Implement additional server-side sanitization of SVG files using robust libraries that neutralize all executable content, including event handlers and foreignObject elements, not just <script> tags. Employ Content Security Policy (CSP) headers to restrict script execution origins and reduce the impact of XSS attacks. Regularly audit user privileges to minimize the number of users with Author-level or higher access. Monitor uploaded media files for suspicious content and remove any untrusted SVG files. Update the AMP for WP plugin promptly once the vendor releases a security patch addressing this vulnerability. Additionally, educate site administrators and users about the risks of uploading complex file types and encourage the use of safer image formats where possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-05T22:04:46.579Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960bf3fecefc3cd7c1371c8

Added to database: 1/9/2026, 8:41:35 AM

Last enriched: 2/26/2026, 6:31:25 PM

Last updated: 3/26/2026, 11:12:39 AM

Views: 183

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses