Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1300: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mehtevas Responsive Header Plugin

0
Medium
VulnerabilityCVE-2026-1300cvecve-2026-1300cwe-79
Published: Sat Jan 24 2026 (01/24/2026, 09:08:06 UTC)
Source: CVE Database V5
Vendor/Project: mehtevas
Product: Responsive Header Plugin

Description

CVE-2026-1300 is a stored Cross-Site Scripting (XSS) vulnerability in the mehtevas Responsive Header WordPress plugin affecting all versions up to 1. 0. It allows authenticated users with administrator-level privileges or higher to inject malicious scripts via multiple plugin settings parameters. The vulnerability arises from insufficient input sanitization and output escaping, leading to script execution when any user accesses the compromised page. This issue specifically impacts multi-site WordPress installations or those with the unfiltered_html capability disabled. The CVSS score is 4. 4 (medium severity), reflecting the requirement for high privileges and the limited impact scope. No known exploits are currently reported in the wild. European organizations using multi-site WordPress setups with this plugin should prioritize patching or mitigating this vulnerability to prevent potential session hijacking or privilege escalation through XSS attacks.

AI-Powered Analysis

AILast updated: 01/24/2026, 09:35:15 UTC

Technical Analysis

CVE-2026-1300 identifies a stored Cross-Site Scripting (XSS) vulnerability in the mehtevas Responsive Header plugin for WordPress, affecting all versions up to and including 1.0. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), where multiple plugin settings parameters lack sufficient input sanitization and output escaping. Authenticated attackers with administrator-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into plugin settings, which is then stored and executed whenever any user views the affected pages. This persistent XSS can lead to session hijacking, defacement, or further privilege escalation. The vulnerability specifically impacts WordPress multi-site installations or single-site installations where the unfiltered_html capability is disabled, as these configurations restrict direct HTML input, making the plugin’s insufficient sanitization a critical vector. The CVSS 3.1 base score is 4.4, reflecting network attack vector, high attack complexity, required privileges at the administrator level, no user interaction, and partial confidentiality and integrity impact without availability impact. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The issue highlights the importance of rigorous input validation and output encoding in WordPress plugins, especially those handling administrative settings in multi-site environments.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those running WordPress multi-site environments with the mehtevas Responsive Header plugin installed. Exploitation requires administrator-level access, which limits the attack surface to insiders or compromised admin accounts. However, successful exploitation can lead to persistent XSS attacks that compromise user sessions, steal sensitive data, or facilitate further attacks such as privilege escalation or malware distribution. Organizations in sectors with high reliance on WordPress multi-site deployments—such as media, education, and government—may face reputational damage and regulatory scrutiny if user data confidentiality is breached. The vulnerability’s impact on integrity and confidentiality, though limited, can disrupt trust in web services and lead to compliance violations under GDPR if personal data is exposed. Since no known exploits exist yet, proactive mitigation can prevent exploitation. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in environments with multiple administrators or high-value targets.

Mitigation Recommendations

1. Immediately audit WordPress installations to identify the presence of the mehtevas Responsive Header plugin, particularly in multi-site configurations. 2. Disable or remove the plugin if it is not essential to reduce the attack surface. 3. If the plugin is required, restrict administrator access strictly and monitor for unusual administrative activities. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting plugin settings parameters. 5. Educate administrators on the risks of stored XSS and enforce strong authentication and session management policies. 6. Regularly back up WordPress sites and maintain an incident response plan for potential XSS exploitation. 7. Monitor official plugin repositories and security advisories for patches or updates addressing this vulnerability and apply them promptly once available. 8. Consider deploying Content Security Policy (CSP) headers to mitigate the impact of injected scripts. 9. Review and harden WordPress capability settings, especially the unfiltered_html capability, to limit HTML input where possible. 10. Conduct periodic security assessments focusing on plugin vulnerabilities in multi-site environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-21T18:44:21.554Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69748ef84623b1157cac2e8a

Added to database: 1/24/2026, 9:20:56 AM

Last enriched: 1/24/2026, 9:35:15 AM

Last updated: 1/24/2026, 12:05:25 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats