CVE-2026-0812: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in guillaumev LinkedIn SC
CVE-2026-0812 is a stored cross-site scripting (XSS) vulnerability in the LinkedIn SC WordPress plugin (versions up to 1. 1. 9). It allows authenticated users with administrator-level privileges to inject malicious scripts via certain plugin parameters due to improper input sanitization and output escaping. These scripts execute whenever any user accesses the affected page, potentially compromising user data and session integrity. The vulnerability has a medium severity score of 4. 4 and requires high privileges to exploit, with no user interaction needed. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential targeted attacks. Countries with high WordPress usage and significant LinkedIn SC plugin adoption are more likely to be impacted.
AI Analysis
Technical Summary
CVE-2026-0812 is a stored cross-site scripting (XSS) vulnerability identified in the LinkedIn SC plugin for WordPress, maintained by guillaumev. The flaw exists in all plugin versions up to and including 1.1.9 and arises from improper neutralization of input during web page generation, specifically within the 'linkedin_sc_date_format', 'linkedin_sc_api_key', and 'linkedin_sc_secret_key' parameters. These parameters lack sufficient input sanitization and output escaping, allowing an attacker with administrator-level privileges to inject arbitrary JavaScript code into pages generated by the plugin. Because the vulnerability is stored, the malicious script persists in the website's content and executes whenever any user visits the compromised page. The vulnerability requires authenticated access with high privileges (administrator or above), does not require user interaction to trigger, and affects the confidentiality and integrity of user data by potentially stealing session cookies or performing actions on behalf of users. The CVSS v3.1 base score is 4.4 (medium severity), reflecting the need for high privileges and the limited impact on availability. No public exploits have been reported to date, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple users or sensitive data. The lack of available patches at the time of reporting necessitates immediate mitigation steps by site administrators.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress sites, potentially compromising user sessions, leaking sensitive information, or enabling further attacks such as privilege escalation or phishing. Organizations relying on the LinkedIn SC plugin for embedding LinkedIn content or functionalities are at risk, particularly if the plugin is used on sites with multiple users or customers. The impact is primarily on confidentiality and integrity, as attackers could hijack user sessions or manipulate displayed content. Although the vulnerability requires administrator-level access to exploit, insider threats or compromised admin accounts could be leveraged to deploy malicious scripts. This could damage organizational reputation, lead to data breaches, and violate data protection regulations such as GDPR. The medium severity score reflects these risks but also the limited scope of exploitation due to required privileges. European companies with public-facing WordPress sites integrating LinkedIn SC should assess their exposure and remediate promptly to avoid targeted attacks or compliance issues.
Mitigation Recommendations
Since no official patches are currently available, European organizations should take immediate practical steps to mitigate the risk. First, restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Conduct thorough audits of all administrator accounts and remove any unnecessary privileges. Temporarily disable or uninstall the LinkedIn SC plugin if feasible until a patched version is released. If disabling is not possible, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the vulnerable parameters ('linkedin_sc_date_format', 'linkedin_sc_api_key', 'linkedin_sc_secret_key'). Additionally, monitor logs for unusual administrator activity or unexpected changes to plugin settings. Educate administrators on the risks of injecting untrusted data. Once a patch is available, apply it immediately. Regularly update WordPress core and all plugins to minimize exposure to similar vulnerabilities. Finally, consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-0812: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in guillaumev LinkedIn SC
Description
CVE-2026-0812 is a stored cross-site scripting (XSS) vulnerability in the LinkedIn SC WordPress plugin (versions up to 1. 1. 9). It allows authenticated users with administrator-level privileges to inject malicious scripts via certain plugin parameters due to improper input sanitization and output escaping. These scripts execute whenever any user accesses the affected page, potentially compromising user data and session integrity. The vulnerability has a medium severity score of 4. 4 and requires high privileges to exploit, with no user interaction needed. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential targeted attacks. Countries with high WordPress usage and significant LinkedIn SC plugin adoption are more likely to be impacted.
AI-Powered Analysis
Technical Analysis
CVE-2026-0812 is a stored cross-site scripting (XSS) vulnerability identified in the LinkedIn SC plugin for WordPress, maintained by guillaumev. The flaw exists in all plugin versions up to and including 1.1.9 and arises from improper neutralization of input during web page generation, specifically within the 'linkedin_sc_date_format', 'linkedin_sc_api_key', and 'linkedin_sc_secret_key' parameters. These parameters lack sufficient input sanitization and output escaping, allowing an attacker with administrator-level privileges to inject arbitrary JavaScript code into pages generated by the plugin. Because the vulnerability is stored, the malicious script persists in the website's content and executes whenever any user visits the compromised page. The vulnerability requires authenticated access with high privileges (administrator or above), does not require user interaction to trigger, and affects the confidentiality and integrity of user data by potentially stealing session cookies or performing actions on behalf of users. The CVSS v3.1 base score is 4.4 (medium severity), reflecting the need for high privileges and the limited impact on availability. No public exploits have been reported to date, but the vulnerability poses a risk to WordPress sites using this plugin, especially those with multiple users or sensitive data. The lack of available patches at the time of reporting necessitates immediate mitigation steps by site administrators.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress sites, potentially compromising user sessions, leaking sensitive information, or enabling further attacks such as privilege escalation or phishing. Organizations relying on the LinkedIn SC plugin for embedding LinkedIn content or functionalities are at risk, particularly if the plugin is used on sites with multiple users or customers. The impact is primarily on confidentiality and integrity, as attackers could hijack user sessions or manipulate displayed content. Although the vulnerability requires administrator-level access to exploit, insider threats or compromised admin accounts could be leveraged to deploy malicious scripts. This could damage organizational reputation, lead to data breaches, and violate data protection regulations such as GDPR. The medium severity score reflects these risks but also the limited scope of exploitation due to required privileges. European companies with public-facing WordPress sites integrating LinkedIn SC should assess their exposure and remediate promptly to avoid targeted attacks or compliance issues.
Mitigation Recommendations
Since no official patches are currently available, European organizations should take immediate practical steps to mitigate the risk. First, restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Conduct thorough audits of all administrator accounts and remove any unnecessary privileges. Temporarily disable or uninstall the LinkedIn SC plugin if feasible until a patched version is released. If disabling is not possible, implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the vulnerable parameters ('linkedin_sc_date_format', 'linkedin_sc_api_key', 'linkedin_sc_secret_key'). Additionally, monitor logs for unusual administrator activity or unexpected changes to plugin settings. Educate administrators on the risks of injecting untrusted data. Once a patch is available, apply it immediately. Regularly update WordPress core and all plugins to minimize exposure to similar vulnerabilities. Finally, consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-09T15:29:04.501Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69673f958330e06716b84fc8
Added to database: 1/14/2026, 7:02:45 AM
Last enriched: 1/14/2026, 7:17:35 AM
Last updated: 1/14/2026, 8:17:42 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prasannasp Short Link
MediumCVE-2026-0741: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in electric-studio Electric Studio Download Counter
MediumCVE-2026-0739: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webbu WMF Mobile Redirector
MediumCVE-2026-0734: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dfieldfl WP Allowed Hosts
MediumCVE-2025-15513: CWE-863 Incorrect Authorization in floattechnologies Float Payment Gateway
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.