Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1300: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mehtevas Responsive Header Plugin

0
Medium
VulnerabilityCVE-2026-1300cvecve-2026-1300cwe-79
Published: Sat Jan 24 2026 (01/24/2026, 09:08:06 UTC)
Source: CVE Database V5
Vendor/Project: mehtevas
Product: Responsive Header Plugin

Description

The Responsive Header plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple plugin settings parameters in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 19:04:36 UTC

Technical Analysis

CVE-2026-1300 identifies a stored Cross-Site Scripting (XSS) vulnerability in the mehtevas Responsive Header plugin for WordPress, present in all versions up to and including 1.0. The vulnerability stems from improper neutralization of input during web page generation, specifically due to insufficient sanitization and escaping of multiple plugin settings parameters. Authenticated attackers with administrator-level access or higher can exploit this vulnerability by injecting arbitrary JavaScript code into plugin settings, which is then persistently stored and executed in the context of any user accessing the affected pages. This vulnerability is particularly relevant for WordPress multi-site installations or those where the unfiltered_html capability is disabled, as these configurations allow the exploit to manifest. The attack vector requires network access and high privileges (administrator), but no user interaction is needed for the malicious script to execute once injected. The vulnerability affects confidentiality and integrity by enabling script injection that could lead to session hijacking, credential theft, or further privilege escalation within the WordPress admin environment. The CVSS 3.1 base score is 4.4, indicating medium severity, with attack complexity rated high due to the need for administrator privileges and no direct impact on availability. No patches or known exploits are currently reported, but the risk remains significant for affected environments.

Potential Impact

The primary impact of CVE-2026-1300 is the potential for persistent Cross-Site Scripting attacks within WordPress multi-site environments using the vulnerable Responsive Header plugin. Successful exploitation could allow an attacker with administrator privileges to execute arbitrary JavaScript in the context of other administrators or users accessing the affected pages. This can lead to session hijacking, theft of sensitive data, unauthorized actions performed on behalf of other users, and potential privilege escalation. Although the vulnerability requires high privileges to exploit, the persistence of injected scripts increases the risk of lateral movement and broader compromise within the WordPress installation. Organizations relying on multi-site WordPress setups with this plugin may face increased risk of internal compromise, data leakage, and disruption of administrative operations. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often target WordPress plugins due to their widespread use. The medium CVSS score reflects moderate impact, but the scope is limited to environments with specific configurations and high-privilege attackers.

Mitigation Recommendations

To mitigate CVE-2026-1300, organizations should first verify if they are using the mehtevas Responsive Header plugin in multi-site WordPress installations or with unfiltered_html disabled. Since no official patch is currently available, administrators should consider the following specific actions: 1) Restrict administrator access strictly to trusted personnel to reduce the risk of malicious script injection. 2) Temporarily disable or uninstall the Responsive Header plugin in multi-site environments until a patch is released. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting plugin settings parameters. 4) Regularly audit plugin settings and database entries for unexpected or suspicious script content. 5) Enable Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the WordPress admin interface. 6) Monitor WordPress logs and user activity for signs of exploitation attempts. 7) Once available, promptly apply vendor patches or updates addressing this vulnerability. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and temporary plugin management tailored to the vulnerability's characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-21T18:44:21.554Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69748ef84623b1157cac2e8a

Added to database: 1/24/2026, 9:20:56 AM

Last enriched: 2/26/2026, 7:04:36 PM

Last updated: 3/25/2026, 11:19:55 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses