CVE-2026-0739: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webbu WMF Mobile Redirector
CVE-2026-0739 is a stored Cross-Site Scripting (XSS) vulnerability in the WMF Mobile Redirector WordPress plugin versions up to 1. 2. It allows authenticated users with Administrator-level privileges to inject malicious scripts via plugin settings, which execute when other users access the affected pages. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation requires high privileges and no user interaction but can impact confidentiality and integrity by executing arbitrary scripts in the context of the victim's browser. The CVSS score is 4. 4 (medium severity), reflecting the need for administrator access and the limited impact on availability. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this vulnerability to prevent potential session hijacking or data theft. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2026-0739 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WMF Mobile Redirector plugin for WordPress, affecting all versions up to and including 1.2. The vulnerability stems from improper neutralization of input during web page generation, specifically due to insufficient input sanitization and output escaping in the plugin's settings interface. An attacker with authenticated Administrator-level access can inject arbitrary JavaScript code into plugin settings, which is then stored and rendered on pages accessed by other users. This stored XSS can lead to execution of malicious scripts in the context of the victim’s browser session, potentially allowing theft of cookies, session tokens, or other sensitive information, as well as unauthorized actions on behalf of the victim. The attack vector requires network access (remote), high attack complexity due to the need for administrator privileges, and no user interaction is required for the malicious script to execute once injected. The vulnerability affects confidentiality and integrity but does not impact availability. The CVSS 3.1 base score is 4.4, reflecting medium severity. No patches or known exploits are currently available or reported. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations, the impact of CVE-2026-0739 primarily concerns the confidentiality and integrity of data processed through WordPress sites using the WMF Mobile Redirector plugin. Successful exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions with the privileges of affected users. This is particularly critical for organizations relying on WordPress for customer-facing websites, intranets, or portals where administrators manage content. Although exploitation requires administrator access, insider threats or compromised administrator credentials could lead to significant damage. The vulnerability does not affect availability, so service disruption is unlikely. However, reputational damage and regulatory compliance issues (e.g., GDPR) could arise if personal data is exposed or manipulated. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the widespread use of WordPress in Europe.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WMF Mobile Redirector plugin and verify its version. Since no official patches are currently available, administrators should consider the following mitigations: (1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). (2) Review and sanitize all plugin settings inputs manually to remove any suspicious scripts. (3) Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the plugin’s settings pages. (4) Monitor logs for unusual administrator activity or changes in plugin settings. (5) Consider temporarily disabling or uninstalling the plugin if it is not essential until a patch is released. (6) Educate administrators about the risks of stored XSS and the importance of secure input handling. (7) Keep WordPress core and all plugins updated to minimize exposure to other vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-0739: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webbu WMF Mobile Redirector
Description
CVE-2026-0739 is a stored Cross-Site Scripting (XSS) vulnerability in the WMF Mobile Redirector WordPress plugin versions up to 1. 2. It allows authenticated users with Administrator-level privileges to inject malicious scripts via plugin settings, which execute when other users access the affected pages. The vulnerability arises from insufficient input sanitization and output escaping. Exploitation requires high privileges and no user interaction but can impact confidentiality and integrity by executing arbitrary scripts in the context of the victim's browser. The CVSS score is 4. 4 (medium severity), reflecting the need for administrator access and the limited impact on availability. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this vulnerability to prevent potential session hijacking or data theft. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2026-0739 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WMF Mobile Redirector plugin for WordPress, affecting all versions up to and including 1.2. The vulnerability stems from improper neutralization of input during web page generation, specifically due to insufficient input sanitization and output escaping in the plugin's settings interface. An attacker with authenticated Administrator-level access can inject arbitrary JavaScript code into plugin settings, which is then stored and rendered on pages accessed by other users. This stored XSS can lead to execution of malicious scripts in the context of the victim’s browser session, potentially allowing theft of cookies, session tokens, or other sensitive information, as well as unauthorized actions on behalf of the victim. The attack vector requires network access (remote), high attack complexity due to the need for administrator privileges, and no user interaction is required for the malicious script to execute once injected. The vulnerability affects confidentiality and integrity but does not impact availability. The CVSS 3.1 base score is 4.4, reflecting medium severity. No patches or known exploits are currently available or reported. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations, the impact of CVE-2026-0739 primarily concerns the confidentiality and integrity of data processed through WordPress sites using the WMF Mobile Redirector plugin. Successful exploitation could allow attackers to hijack user sessions, steal sensitive information, or perform unauthorized actions with the privileges of affected users. This is particularly critical for organizations relying on WordPress for customer-facing websites, intranets, or portals where administrators manage content. Although exploitation requires administrator access, insider threats or compromised administrator credentials could lead to significant damage. The vulnerability does not affect availability, so service disruption is unlikely. However, reputational damage and regulatory compliance issues (e.g., GDPR) could arise if personal data is exposed or manipulated. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the widespread use of WordPress in Europe.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WMF Mobile Redirector plugin and verify its version. Since no official patches are currently available, administrators should consider the following mitigations: (1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). (2) Review and sanitize all plugin settings inputs manually to remove any suspicious scripts. (3) Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the plugin’s settings pages. (4) Monitor logs for unusual administrator activity or changes in plugin settings. (5) Consider temporarily disabling or uninstalling the plugin if it is not essential until a patch is released. (6) Educate administrators about the risks of stored XSS and the importance of secure input handling. (7) Keep WordPress core and all plugins updated to minimize exposure to other vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-08T16:45:01.339Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69673f948330e06716b84fa5
Added to database: 1/14/2026, 7:02:44 AM
Last enriched: 1/21/2026, 8:30:00 PM
Last updated: 2/7/2026, 3:21:00 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.