Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prasannasp Short Link

0
Medium
VulnerabilityCVE-2026-0813cvecve-2026-0813cwe-79
Published: Wed Jan 14 2026 (01/14/2026, 06:40:05 UTC)
Source: CVE Database V5
Vendor/Project: prasannasp
Product: Short Link

Description

CVE-2026-0813 is a stored Cross-Site Scripting (XSS) vulnerability in the prasannasp Short Link WordPress plugin affecting all versions up to 1. 0. It allows authenticated users with administrator-level privileges or higher to inject malicious scripts via the 'short_link_post_title' and 'short_link_page_title' parameters. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability requires high privileges and does not need user interaction but has a medium CVSS score of 4. 4 due to limited attack surface and impact. No known exploits are currently reported in the wild. European organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent abuse by insiders or compromised admin accounts.

AI-Powered Analysis

AILast updated: 01/14/2026, 07:17:20 UTC

Technical Analysis

CVE-2026-0813 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 found in the prasannasp Short Link plugin for WordPress. This vulnerability exists in all versions up to and including 1.0 due to insufficient sanitization and escaping of user input in the 'short_link_post_title' and 'short_link_page_title' parameters. An attacker with administrator-level access or higher can inject arbitrary JavaScript code into pages generated by the plugin. Because the malicious script is stored persistently, it executes every time a user visits the affected page, potentially compromising user sessions, stealing cookies, or performing actions on behalf of users. The vulnerability requires authenticated access with high privileges, which limits the attack vector to insiders or compromised admin accounts. The CVSS 3.1 base score is 4.4, reflecting network attack vector, high attack complexity, high privileges required, no user interaction, and a scope change with low confidentiality and integrity impact but no availability impact. No patches or known exploits are currently available, increasing the urgency for organizations to implement compensating controls or monitor for suspicious admin activity. This vulnerability highlights the importance of proper input validation and output encoding in WordPress plugins, especially those handling dynamic content.

Potential Impact

For European organizations, the impact of CVE-2026-0813 primarily revolves around the risk of privilege abuse and session compromise within WordPress environments using the prasannasp Short Link plugin. If an attacker gains administrator access, they can inject malicious scripts that execute for all users visiting affected pages, potentially leading to credential theft, unauthorized actions, or lateral movement within the network. This can undermine the confidentiality and integrity of sensitive data managed via WordPress sites, including customer information, internal communications, or business-critical content. Although the vulnerability does not directly affect availability, the indirect consequences of a successful attack could include reputational damage, regulatory non-compliance (e.g., GDPR), and financial losses. The requirement for high privileges reduces the likelihood of external exploitation but raises concerns about insider threats or compromised admin accounts. Organizations relying heavily on WordPress for public-facing or internal portals should consider this vulnerability a moderate risk that warrants timely remediation.

Mitigation Recommendations

1. Immediately audit and restrict administrator-level access to the WordPress environment to trusted personnel only, implementing strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor and log all administrative actions related to the Short Link plugin, focusing on changes to 'short_link_post_title' and 'short_link_page_title' parameters. 3. If an official patch becomes available, apply it promptly. In the absence of patches, consider temporarily disabling or uninstalling the Short Link plugin to eliminate the attack vector. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious script injections targeting the vulnerable parameters. 5. Conduct regular security reviews and vulnerability scans on WordPress plugins to identify similar issues proactively. 6. Educate administrators on the risks of XSS and the importance of secure input handling. 7. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites. 8. Regularly back up WordPress sites and test restoration procedures to minimize downtime in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-09T15:31:18.848Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69673f958330e06716b84fcd

Added to database: 1/14/2026, 7:02:45 AM

Last enriched: 1/14/2026, 7:17:20 AM

Last updated: 1/14/2026, 8:17:34 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats