Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1320: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ays-pro Secure Copy Content Protection and Content Locking

0
High
VulnerabilityCVE-2026-1320cvecve-2026-1320cwe-79
Published: Thu Feb 12 2026 (02/12/2026, 13:25:33 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Secure Copy Content Protection and Content Locking

Description

The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'X-Forwarded-For' HTTP header in all versions up to, and including, 4.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 19:06:16 UTC

Technical Analysis

CVE-2026-1320 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 that affects the Secure Copy Content Protection and Content Locking plugin for WordPress, developed by ays-pro. This vulnerability exists in all versions up to and including 4.9.8. The root cause is insufficient input sanitization and output escaping of the 'X-Forwarded-For' HTTP header, which is commonly used to identify the originating IP address of a client connecting through a proxy or load balancer. Because the plugin improperly processes this header, an attacker can craft a malicious HTTP request with a specially crafted 'X-Forwarded-For' header containing arbitrary JavaScript code. This code is then stored persistently on the server and rendered in web pages viewed by other users. When a victim accesses a page containing the injected script, it executes in their browser context, potentially allowing the attacker to steal session cookies, perform actions on behalf of the user, or deliver further malware. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score is 7.2, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N highlighting network attack vector, low attack complexity, no privileges or user interaction required, and a scope change affecting confidentiality and integrity but not availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects all installations using the vulnerable plugin versions, which are commonly deployed on WordPress sites for content protection and locking functionality.

Potential Impact

The impact of CVE-2026-1320 is significant for organizations using the affected WordPress plugin. Successful exploitation can lead to the execution of arbitrary JavaScript in the context of users visiting the compromised site, enabling attackers to steal sensitive information such as session tokens, cookies, or personal data, thereby compromising user confidentiality. Attackers may also manipulate site content or perform unauthorized actions on behalf of users, affecting data integrity. Although availability is not directly impacted, the reputational damage and loss of user trust can be severe, especially for e-commerce, financial, or content-driven websites. The vulnerability's ease of exploitation without authentication or user interaction broadens the attack surface, making automated mass exploitation feasible. Organizations relying on this plugin may face increased risk of targeted attacks or widespread compromise, potentially leading to data breaches, regulatory penalties, and financial losses.

Mitigation Recommendations

To mitigate CVE-2026-1320, organizations should immediately assess their WordPress environments for the presence of the Secure Copy Content Protection and Content Locking plugin and verify the version in use. Since no official patch is currently linked, administrators should consider the following specific actions: 1) Temporarily disable or uninstall the vulnerable plugin until a security update is available. 2) Implement web application firewall (WAF) rules to sanitize or block suspicious 'X-Forwarded-For' header values containing script tags or unusual characters. 3) Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce the impact of injected scripts. 4) Monitor web server and application logs for anomalous requests containing suspicious header values. 5) Educate site administrators and developers on secure coding practices, emphasizing proper input validation and output encoding. 6) Regularly update WordPress core and plugins to the latest versions once patches are released. 7) Consider using security plugins that detect and block XSS attempts. These targeted mitigations go beyond generic advice by focusing on header inspection, temporary plugin removal, and layered defenses to reduce risk until an official fix is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-22T01:20:10.757Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698de160c9e1ff5ad8dd2348

Added to database: 2/12/2026, 2:19:12 PM

Last enriched: 2/26/2026, 7:06:16 PM

Last updated: 3/29/2026, 5:17:09 PM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses