CVE-2026-1373: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lawsonry Easy Author Image
The Easy Author Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'author_profile_picture_url' parameter in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2026-1373 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Easy Author Image plugin for WordPress, developed by lawsonry. The vulnerability arises from improper neutralization of input during web page generation, specifically through the 'author_profile_picture_url' parameter. This parameter lacks sufficient input sanitization and output escaping, allowing authenticated users with Subscriber-level access or higher to inject arbitrary JavaScript code that is stored persistently within the plugin's data. When any user accesses a page containing the injected script, the malicious code executes in their browser context. This can lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim user. The vulnerability affects all versions up to and including 1.7 of the plugin. The CVSS v3.1 score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (authenticated user), no user interaction, and a scope change (impacting other components beyond the vulnerable plugin). The vulnerability compromises confidentiality and integrity but does not impact availability. No public exploits have been reported yet. The flaw is classified under CWE-79, which is a common and well-understood web application security issue. The plugin is used in WordPress environments, which are widely deployed for content management and publishing.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the Easy Author Image plugin, especially those with multiple authenticated users such as content creators or subscribers. Exploitation can lead to unauthorized script execution, enabling attackers to hijack user sessions, steal credentials, or manipulate site content. This undermines user trust and can result in data breaches or reputational damage. Since WordPress powers a substantial portion of European websites, including government, educational, and commercial sectors, the potential impact is broad. The vulnerability's requirement for authenticated access limits exposure but does not eliminate risk, as subscriber-level accounts are common. The scope change in the CVSS vector indicates that the attack can affect components beyond the plugin itself, potentially compromising other parts of the website or user data. Although no known exploits exist currently, the medium severity and ease of exploitation warrant proactive mitigation to prevent future attacks.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the lawsonry Easy Author Image plugin as soon as they are released. 2. In the absence of patches, restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on sites with untrusted users. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'author_profile_picture_url' parameter. 4. Employ additional server-side input validation and output encoding for all user-supplied data, particularly in custom themes or plugins interacting with Easy Author Image. 5. Conduct regular security audits and penetration tests focusing on XSS vulnerabilities in WordPress environments. 6. Educate content editors and users about the risks of XSS and encourage reporting of unusual site behavior. 7. Consider disabling or replacing the Easy Author Image plugin with alternatives that have better security track records if immediate patching is not feasible.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1373: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lawsonry Easy Author Image
Description
The Easy Author Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'author_profile_picture_url' parameter in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2026-1373 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Easy Author Image plugin for WordPress, developed by lawsonry. The vulnerability arises from improper neutralization of input during web page generation, specifically through the 'author_profile_picture_url' parameter. This parameter lacks sufficient input sanitization and output escaping, allowing authenticated users with Subscriber-level access or higher to inject arbitrary JavaScript code that is stored persistently within the plugin's data. When any user accesses a page containing the injected script, the malicious code executes in their browser context. This can lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim user. The vulnerability affects all versions up to and including 1.7 of the plugin. The CVSS v3.1 score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges (authenticated user), no user interaction, and a scope change (impacting other components beyond the vulnerable plugin). The vulnerability compromises confidentiality and integrity but does not impact availability. No public exploits have been reported yet. The flaw is classified under CWE-79, which is a common and well-understood web application security issue. The plugin is used in WordPress environments, which are widely deployed for content management and publishing.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the Easy Author Image plugin, especially those with multiple authenticated users such as content creators or subscribers. Exploitation can lead to unauthorized script execution, enabling attackers to hijack user sessions, steal credentials, or manipulate site content. This undermines user trust and can result in data breaches or reputational damage. Since WordPress powers a substantial portion of European websites, including government, educational, and commercial sectors, the potential impact is broad. The vulnerability's requirement for authenticated access limits exposure but does not eliminate risk, as subscriber-level accounts are common. The scope change in the CVSS vector indicates that the attack can affect components beyond the plugin itself, potentially compromising other parts of the website or user data. Although no known exploits exist currently, the medium severity and ease of exploitation warrant proactive mitigation to prevent future attacks.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the lawsonry Easy Author Image plugin as soon as they are released. 2. In the absence of patches, restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access, especially on sites with untrusted users. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'author_profile_picture_url' parameter. 4. Employ additional server-side input validation and output encoding for all user-supplied data, particularly in custom themes or plugins interacting with Easy Author Image. 5. Conduct regular security audits and penetration tests focusing on XSS vulnerabilities in WordPress environments. 6. Educate content editors and users about the risks of XSS and encourage reporting of unusual site behavior. 7. Consider disabling or replacing the Easy Author Image plugin with alternatives that have better security track records if immediate patching is not feasible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-23T16:49:30.413Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699697f56aea4a407a3be103
Added to database: 2/19/2026, 4:56:21 AM
Last enriched: 2/19/2026, 5:13:36 AM
Last updated: 2/21/2026, 12:21:41 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.