Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0680: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vk011 Real Post Slider Lite

0
Medium
VulnerabilityCVE-2026-0680cvecve-2026-0680cwe-79
Published: Wed Jan 14 2026 (01/14/2026, 05:28:05 UTC)
Source: CVE Database V5
Vendor/Project: vk011
Product: Real Post Slider Lite

Description

CVE-2026-0680 is a stored Cross-Site Scripting (XSS) vulnerability in the Real Post Slider Lite WordPress plugin affecting all versions up to 2. 4. It allows authenticated administrators on multi-site WordPress installations with unfiltered_html disabled to inject malicious scripts via plugin settings. These scripts execute whenever a user accesses the compromised page, potentially leading to session hijacking or privilege escalation. The vulnerability has a CVSS score of 4. 4 (medium severity) and requires high privileges and no user interaction to exploit. No known public exploits exist yet. European organizations using multi-site WordPress setups with this plugin should prioritize patching or mitigating this risk to prevent targeted attacks. Countries with high WordPress adoption and significant multi-site usage are most at risk.

AI-Powered Analysis

AILast updated: 01/14/2026, 06:04:33 UTC

Technical Analysis

CVE-2026-0680 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Real Post Slider Lite plugin for WordPress, affecting all versions up to and including 2.4. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically due to insufficient input sanitization and output escaping in the plugin's settings interface. This flaw allows an authenticated attacker with administrator-level privileges to inject arbitrary JavaScript code into pages managed by the plugin. The malicious script is stored persistently and executes whenever any user accesses the infected page. Exploitation requires a multi-site WordPress installation where the unfiltered_html capability is disabled, which restricts the attack surface but still leaves many installations vulnerable. The vulnerability does not require user interaction beyond visiting the compromised page and does not affect single-site installations. The CVSS v3.1 base score is 4.4, reflecting a medium severity with network attack vector, high attack complexity, and high privileges required. The impact primarily affects confidentiality and integrity, with no direct availability impact. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may rely on configuration changes or plugin updates once available.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for those running multi-site WordPress environments with the Real Post Slider Lite plugin installed. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed in the context of affected users, potentially including administrators. This could compromise sensitive data confidentiality and integrity. Given the requirement for administrator-level access to exploit, the threat is more relevant in scenarios where internal users or compromised admin accounts exist. The multi-site limitation narrows the scope but many European enterprises and service providers use multi-site WordPress setups for managing multiple domains or clients. The lack of known exploits reduces immediate risk but also means organizations should proactively address the vulnerability before attackers develop weaponized code. The vulnerability could be leveraged in targeted attacks against high-value websites, including government portals, e-commerce platforms, or media outlets prevalent in Europe.

Mitigation Recommendations

1. Immediately audit WordPress installations to identify multi-site environments using the Real Post Slider Lite plugin, especially versions up to 2.4. 2. Restrict administrator access strictly and review user privileges to minimize the risk of insider threats or compromised admin accounts. 3. Disable or limit the use of the vulnerable plugin until a vendor patch or update is released. 4. If disabling the plugin is not feasible, consider implementing Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts targeting plugin settings. 5. Enable Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting script sources. 6. Monitor logs for unusual administrator activity or unexpected changes in plugin settings. 7. Educate administrators about the risks of XSS and the importance of secure plugin management. 8. Stay updated with vendor announcements for patches or security advisories related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T17:53:52.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e028330e067168f404e

Added to database: 1/14/2026, 5:47:46 AM

Last enriched: 1/14/2026, 6:04:33 AM

Last updated: 1/14/2026, 7:08:48 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats