Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1098: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codemacher CM CSS Columns

0
Medium
VulnerabilityCVE-2026-1098cvecve-2026-1098cwe-79
Published: Sat Jan 24 2026 (01/24/2026, 08:26:36 UTC)
Source: CVE Database V5
Vendor/Project: codemacher
Product: CM CSS Columns

Description

The CM CSS Columns plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' shortcode attribute in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 02/01/2026, 08:30:59 UTC

Technical Analysis

CVE-2026-1098 is a stored Cross-Site Scripting (XSS) vulnerability identified in the CM CSS Columns plugin for WordPress, a tool used to manage CSS column layouts via shortcodes. The vulnerability specifically targets the 'tag' shortcode attribute, which is insufficiently sanitized and escaped before being rendered on pages. This flaw allows authenticated users with Contributor-level permissions or higher to inject arbitrary JavaScript code into pages. Because the malicious script is stored, it executes every time a user accesses the infected page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and has a CVSS 3.1 base score of 6.4, reflecting a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and privileges at the contributor level, but no user interaction is needed for exploitation. The vulnerability affects all versions up to and including 1.2.1 of the plugin. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability's scope is confined to WordPress sites using this specific plugin, but given WordPress's widespread use, the potential impact is significant. The stored nature of the XSS increases risk by enabling persistent attacks against site visitors and administrators.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the CM CSS Columns plugin installed. Exploitation can lead to session hijacking, unauthorized actions performed with the privileges of logged-in users, defacement, or distribution of malware via injected scripts. Since Contributor-level access is sufficient, attackers who have compromised or registered such accounts can leverage this vulnerability to escalate their impact. This can undermine the integrity and confidentiality of user data and damage organizational reputation. In sectors such as e-commerce, government, and media, where WordPress is commonly used, the impact could disrupt services and erode user trust. The vulnerability does not affect availability directly but can lead to indirect denial of service through site defacement or administrative lockout. The medium CVSS score reflects moderate risk, but the persistent nature of stored XSS and the widespread use of WordPress in Europe elevate the threat level. Organizations with multiple contributors or open registration policies are particularly vulnerable.

Mitigation Recommendations

Immediate mitigation steps include restricting Contributor-level access to trusted users only and monitoring user-generated content for suspicious inputs. Since no official patch is currently available, administrators should implement manual input validation and output escaping for the 'tag' shortcode attribute in the plugin code to neutralize malicious scripts. Employing Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting shortcode parameters can reduce risk. Regularly auditing user roles and permissions to minimize unnecessary contributor accounts is critical. Organizations should also monitor logs for unusual activity related to shortcode usage and user content submissions. Once a vendor patch is released, prompt updating of the plugin is essential. Additionally, educating content contributors about safe content practices and potential risks can help prevent exploitation. Backup and recovery plans should be tested to ensure rapid restoration if an attack occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-16T21:43:04.285Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6974846c4623b1157ca99ee2

Added to database: 1/24/2026, 8:35:56 AM

Last enriched: 2/1/2026, 8:30:59 AM

Last updated: 2/7/2026, 6:39:03 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats