CVE-2026-0914: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in legalweb WP DSGVO Tools (GDPR)
CVE-2026-0914 is a stored Cross-Site Scripting (XSS) vulnerability in the WP DSGVO Tools (GDPR) WordPress plugin, affecting all versions up to 3. 1. 36. Authenticated users with contributor-level access or higher can inject malicious scripts via the 'lw_content_block' shortcode due to improper input sanitization and output escaping. These scripts execute when any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known public exploits exist yet. European organizations using this plugin on WordPress sites face risks to confidentiality and integrity, especially those handling GDPR compliance. Mitigation involves promptly updating the plugin once a patch is available, restricting contributor privileges, and applying web application firewall rules to detect malicious shortcode usage.
AI Analysis
Technical Summary
CVE-2026-0914 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WP DSGVO Tools (GDPR) plugin for WordPress, which is widely used to assist with GDPR compliance. The vulnerability exists in all versions up to and including 3.1.36 and stems from insufficient sanitization and escaping of user-supplied attributes within the plugin's 'lw_content_block' shortcode. Authenticated attackers with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts. Because the malicious script is stored persistently, it executes every time any user accesses the affected page, potentially allowing attackers to hijack user sessions, steal cookies, perform actions on behalf of users, or deface websites. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector over the network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits have been reported yet, but the vulnerability's presence in a GDPR compliance plugin increases its attractiveness to attackers targeting European organizations. The flaw highlights the risks of improper input validation in WordPress plugins, especially those handling sensitive regulatory content.
Potential Impact
For European organizations, this vulnerability poses significant risks due to the plugin's role in GDPR compliance, which is critical for legal and regulatory adherence. Exploitation could lead to unauthorized disclosure of sensitive information, session hijacking of users including administrators, and potential defacement or manipulation of website content. This undermines user trust and could result in regulatory penalties if personal data is compromised. Since the vulnerability requires only contributor-level access, insider threats or compromised low-privilege accounts can be leveraged to escalate attacks. The persistent nature of stored XSS means that any visitor to the infected pages is at risk, broadening the impact. Organizations relying on WordPress sites with this plugin, especially those in sectors handling personal data such as healthcare, finance, or public services, face increased exposure. Additionally, reputational damage and operational disruptions may occur if attackers leverage the vulnerability to inject phishing or malware delivery scripts.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the WP DSGVO Tools (GDPR) plugin and verify the version in use. Until an official patch is released, restrict contributor-level and higher privileges to trusted users only, minimizing the risk of malicious shortcode injection. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute patterns indicative of XSS payloads. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. Regularly monitor website content for unexpected script injections or modifications. Educate content contributors about the risks of injecting untrusted content. Once a patch becomes available, apply it promptly. Additionally, consider isolating GDPR-related plugins in staging environments before production deployment to detect vulnerabilities early. Conduct periodic security assessments focusing on WordPress plugins and their input validation mechanisms.
Affected Countries
Germany, France, Netherlands, Belgium, Sweden, Austria
CVE-2026-0914: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in legalweb WP DSGVO Tools (GDPR)
Description
CVE-2026-0914 is a stored Cross-Site Scripting (XSS) vulnerability in the WP DSGVO Tools (GDPR) WordPress plugin, affecting all versions up to 3. 1. 36. Authenticated users with contributor-level access or higher can inject malicious scripts via the 'lw_content_block' shortcode due to improper input sanitization and output escaping. These scripts execute when any user views the compromised page, potentially leading to session hijacking, defacement, or further attacks. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with low privileges. No known public exploits exist yet. European organizations using this plugin on WordPress sites face risks to confidentiality and integrity, especially those handling GDPR compliance. Mitigation involves promptly updating the plugin once a patch is available, restricting contributor privileges, and applying web application firewall rules to detect malicious shortcode usage.
AI-Powered Analysis
Technical Analysis
CVE-2026-0914 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WP DSGVO Tools (GDPR) plugin for WordPress, which is widely used to assist with GDPR compliance. The vulnerability exists in all versions up to and including 3.1.36 and stems from insufficient sanitization and escaping of user-supplied attributes within the plugin's 'lw_content_block' shortcode. Authenticated attackers with contributor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into pages or posts. Because the malicious script is stored persistently, it executes every time any user accesses the affected page, potentially allowing attackers to hijack user sessions, steal cookies, perform actions on behalf of users, or deface websites. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity, with an attack vector over the network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits have been reported yet, but the vulnerability's presence in a GDPR compliance plugin increases its attractiveness to attackers targeting European organizations. The flaw highlights the risks of improper input validation in WordPress plugins, especially those handling sensitive regulatory content.
Potential Impact
For European organizations, this vulnerability poses significant risks due to the plugin's role in GDPR compliance, which is critical for legal and regulatory adherence. Exploitation could lead to unauthorized disclosure of sensitive information, session hijacking of users including administrators, and potential defacement or manipulation of website content. This undermines user trust and could result in regulatory penalties if personal data is compromised. Since the vulnerability requires only contributor-level access, insider threats or compromised low-privilege accounts can be leveraged to escalate attacks. The persistent nature of stored XSS means that any visitor to the infected pages is at risk, broadening the impact. Organizations relying on WordPress sites with this plugin, especially those in sectors handling personal data such as healthcare, finance, or public services, face increased exposure. Additionally, reputational damage and operational disruptions may occur if attackers leverage the vulnerability to inject phishing or malware delivery scripts.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the WP DSGVO Tools (GDPR) plugin and verify the version in use. Until an official patch is released, restrict contributor-level and higher privileges to trusted users only, minimizing the risk of malicious shortcode injection. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode attribute patterns indicative of XSS payloads. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on affected sites. Regularly monitor website content for unexpected script injections or modifications. Educate content contributors about the risks of injecting untrusted content. Once a patch becomes available, apply it promptly. Additionally, consider isolating GDPR-related plugins in staging environments before production deployment to detect vulnerabilities early. Conduct periodic security assessments focusing on WordPress plugins and their input validation mechanisms.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-13T19:00:53.711Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69736eb04623b1157c3e7c30
Added to database: 1/23/2026, 12:50:56 PM
Last enriched: 1/23/2026, 1:06:02 PM
Last updated: 1/23/2026, 2:08:42 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13921: CWE-862 Missing Authorization in wedevs weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot
MediumCVE-2025-4320: CWE-305 Authentication Bypass by Primary Weakness in Birebirsoft Software and Technology Solutions Sufirmam
CriticalCVE-2025-4319: CWE-307 Improper Restriction of Excessive Authentication Attempts in Birebirsoft Software and Technology Solutions Sufirmam
CriticalCVE-2025-14866: CWE-863 Incorrect Authorization in melapress Melapress Role Editor
HighAI jailbreaking via poetry: bypassing chatbot defenses with rhyme | Kaspersky official blog
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.