CVE-2026-1570: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dannycarlton Simple Bible Verse via Shortcode
The Simple Bible Verse via Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `verse` shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2026-1570 identifies a stored cross-site scripting (XSS) vulnerability in the Simple Bible Verse via Shortcode plugin for WordPress, which is widely used to embed Bible verses via shortcodes in posts and pages. The vulnerability arises from improper neutralization of user-supplied input in the 'verse' shortcode attribute, where the plugin fails to adequately sanitize and escape input before rendering it on web pages. This flaw allows authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages or posts. Because the injected scripts are stored persistently, they execute in the context of any user who views the compromised content, potentially leading to session hijacking, privilege escalation, or defacement. The CVSS 3.1 base score of 6.4 reflects a medium severity, with an attack vector of network, low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change since the vulnerability affects other users viewing the content. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to WordPress sites that use this plugin, especially those with multiple content contributors. The lack of a patch at the time of reporting means that affected sites remain vulnerable until the vendor releases an update or mitigations are applied.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution within their WordPress sites, compromising the confidentiality and integrity of user sessions and data. Attackers could steal authentication cookies, perform actions on behalf of users, or deface websites, damaging organizational reputation and trust. Organizations with contributor-level users who can publish content are particularly at risk, as these users can exploit the vulnerability without requiring higher administrative privileges. The impact is heightened for organizations running community, religious, or educational websites that use the Simple Bible Verse plugin to display scripture, as these sites may have active user bases and sensitive user data. Additionally, the scope of the vulnerability allows an attacker to affect other users viewing the compromised pages, potentially leading to widespread impact within the organization or its user community. While availability is not directly impacted, the reputational damage and potential data leakage can have significant operational consequences.
Mitigation Recommendations
1. Immediately restrict contributor-level user permissions to prevent untrusted users from publishing or editing content until a patch is available. 2. Monitor and audit all content submitted via the Simple Bible Verse shortcode for suspicious or unexpected script tags or HTML. 3. Implement web application firewall (WAF) rules to detect and block attempts to inject JavaScript via shortcode attributes. 4. Encourage the vendor to release a patched version that properly sanitizes and escapes all user inputs in the shortcode. 5. As a temporary measure, disable or remove the Simple Bible Verse via Shortcode plugin if it is not essential. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict content review policies. 7. Use security plugins that can detect stored XSS attempts and alert administrators. 8. Regularly update WordPress core and all plugins to minimize exposure to known vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands
CVE-2026-1570: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dannycarlton Simple Bible Verse via Shortcode
Description
The Simple Bible Verse via Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `verse` shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2026-1570 identifies a stored cross-site scripting (XSS) vulnerability in the Simple Bible Verse via Shortcode plugin for WordPress, which is widely used to embed Bible verses via shortcodes in posts and pages. The vulnerability arises from improper neutralization of user-supplied input in the 'verse' shortcode attribute, where the plugin fails to adequately sanitize and escape input before rendering it on web pages. This flaw allows authenticated users with contributor-level privileges or higher to inject arbitrary JavaScript code into pages or posts. Because the injected scripts are stored persistently, they execute in the context of any user who views the compromised content, potentially leading to session hijacking, privilege escalation, or defacement. The CVSS 3.1 base score of 6.4 reflects a medium severity, with an attack vector of network, low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change since the vulnerability affects other users viewing the content. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to WordPress sites that use this plugin, especially those with multiple content contributors. The lack of a patch at the time of reporting means that affected sites remain vulnerable until the vendor releases an update or mitigations are applied.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized script execution within their WordPress sites, compromising the confidentiality and integrity of user sessions and data. Attackers could steal authentication cookies, perform actions on behalf of users, or deface websites, damaging organizational reputation and trust. Organizations with contributor-level users who can publish content are particularly at risk, as these users can exploit the vulnerability without requiring higher administrative privileges. The impact is heightened for organizations running community, religious, or educational websites that use the Simple Bible Verse plugin to display scripture, as these sites may have active user bases and sensitive user data. Additionally, the scope of the vulnerability allows an attacker to affect other users viewing the compromised pages, potentially leading to widespread impact within the organization or its user community. While availability is not directly impacted, the reputational damage and potential data leakage can have significant operational consequences.
Mitigation Recommendations
1. Immediately restrict contributor-level user permissions to prevent untrusted users from publishing or editing content until a patch is available. 2. Monitor and audit all content submitted via the Simple Bible Verse shortcode for suspicious or unexpected script tags or HTML. 3. Implement web application firewall (WAF) rules to detect and block attempts to inject JavaScript via shortcode attributes. 4. Encourage the vendor to release a patched version that properly sanitizes and escapes all user inputs in the shortcode. 5. As a temporary measure, disable or remove the Simple Bible Verse via Shortcode plugin if it is not essential. 6. Educate content contributors about the risks of injecting untrusted code and enforce strict content review policies. 7. Use security plugins that can detect stored XSS attempts and alert administrators. 8. Regularly update WordPress core and all plugins to minimize exposure to known vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-28T21:14:38.720Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6986fb97f9fa50a62f1cf0d8
Added to database: 2/7/2026, 8:45:11 AM
Last enriched: 2/14/2026, 12:08:10 PM
Last updated: 2/21/2026, 12:20:19 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.