CVE-2026-1985: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arieslab Press3D
The Press3D plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 3D Model Gutenberg block in all versions up to, and including, 1.0.2. This is due to the plugin failing to sanitize and validate the URL scheme when storing link URLs for 3D model blocks, allowing `javascript:` URLs. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages via the link URL parameter that will execute whenever a user clicks on the 3D model.
AI Analysis
Technical Summary
CVE-2026-1985 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Press3D plugin for WordPress, specifically affecting the 3D Model Gutenberg block in all versions up to and including 1.0.2. The root cause is the plugin's failure to properly sanitize and validate the URL scheme when storing link URLs associated with 3D model blocks. This allows an authenticated user with Author-level privileges or higher to inject arbitrary JavaScript code by supplying a crafted `javascript:` URL. When any user subsequently clicks on the 3D model containing the malicious link, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, data theft, or further exploitation within the affected site. The vulnerability requires the attacker to have authenticated access with at least Author privileges, which limits the attack surface to internal or trusted users but does not require additional user interaction beyond clicking the link. The CVSS v3.1 base score is 6.4, reflecting medium severity due to network exploitability, low attack complexity, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, and no patches are currently linked, indicating the need for proactive mitigation. The vulnerability is classified under CWE-79, highlighting improper neutralization of input during web page generation. This issue is particularly relevant for WordPress sites leveraging the Press3D plugin for embedding interactive 3D models, which are increasingly used in e-commerce, education, and marketing sectors.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web applications using the Press3D plugin. Attackers with Author-level access can inject malicious scripts that execute in the browsers of site visitors or other users, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. This can result in data breaches, reputational damage, and loss of customer trust. Since the vulnerability requires authenticated access, it is particularly concerning for organizations with multiple content contributors or less stringent access controls. The exploitation could also facilitate lateral movement within the organization’s web infrastructure or enable further attacks such as phishing or malware distribution. Given the widespread use of WordPress in Europe and the growing adoption of interactive 3D content, the vulnerability could affect sectors including e-commerce, media, education, and digital marketing. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the use of the Press3D plugin, particularly versions up to 1.0.2. Until an official patch is released, administrators should restrict plugin usage to trusted users only and review user roles to minimize the number of users with Author-level or higher privileges. Implement strict input validation and sanitization on URL fields associated with 3D model blocks, either via custom code or security plugins that enforce URL scheme restrictions disallowing `javascript:` and other dangerous schemes. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and untrusted sources, reducing the impact of potential XSS payloads. Monitor logs for unusual activity related to 3D model links and user interactions. Educate content authors about the risks of inserting untrusted URLs. Once a patch or update is available from the vendor, apply it promptly. Additionally, consider deploying Web Application Firewalls (WAFs) with rules targeting XSS attempts in plugin-specific parameters. Regularly review and update user access controls and conduct security awareness training to reduce insider threats.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1985: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arieslab Press3D
Description
The Press3D plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 3D Model Gutenberg block in all versions up to, and including, 1.0.2. This is due to the plugin failing to sanitize and validate the URL scheme when storing link URLs for 3D model blocks, allowing `javascript:` URLs. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages via the link URL parameter that will execute whenever a user clicks on the 3D model.
AI-Powered Analysis
Technical Analysis
CVE-2026-1985 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Press3D plugin for WordPress, specifically affecting the 3D Model Gutenberg block in all versions up to and including 1.0.2. The root cause is the plugin's failure to properly sanitize and validate the URL scheme when storing link URLs associated with 3D model blocks. This allows an authenticated user with Author-level privileges or higher to inject arbitrary JavaScript code by supplying a crafted `javascript:` URL. When any user subsequently clicks on the 3D model containing the malicious link, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, data theft, or further exploitation within the affected site. The vulnerability requires the attacker to have authenticated access with at least Author privileges, which limits the attack surface to internal or trusted users but does not require additional user interaction beyond clicking the link. The CVSS v3.1 base score is 6.4, reflecting medium severity due to network exploitability, low attack complexity, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, and no patches are currently linked, indicating the need for proactive mitigation. The vulnerability is classified under CWE-79, highlighting improper neutralization of input during web page generation. This issue is particularly relevant for WordPress sites leveraging the Press3D plugin for embedding interactive 3D models, which are increasingly used in e-commerce, education, and marketing sectors.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of web applications using the Press3D plugin. Attackers with Author-level access can inject malicious scripts that execute in the browsers of site visitors or other users, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. This can result in data breaches, reputational damage, and loss of customer trust. Since the vulnerability requires authenticated access, it is particularly concerning for organizations with multiple content contributors or less stringent access controls. The exploitation could also facilitate lateral movement within the organization’s web infrastructure or enable further attacks such as phishing or malware distribution. Given the widespread use of WordPress in Europe and the growing adoption of interactive 3D content, the vulnerability could affect sectors including e-commerce, media, education, and digital marketing. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the use of the Press3D plugin, particularly versions up to 1.0.2. Until an official patch is released, administrators should restrict plugin usage to trusted users only and review user roles to minimize the number of users with Author-level or higher privileges. Implement strict input validation and sanitization on URL fields associated with 3D model blocks, either via custom code or security plugins that enforce URL scheme restrictions disallowing `javascript:` and other dangerous schemes. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and untrusted sources, reducing the impact of potential XSS payloads. Monitor logs for unusual activity related to 3D model links and user interactions. Educate content authors about the risks of inserting untrusted URLs. Once a patch or update is available from the vendor, apply it promptly. Additionally, consider deploying Web Application Firewalls (WAFs) with rules targeting XSS attempts in plugin-specific parameters. Regularly review and update user access controls and conduct security awareness training to reduce insider threats.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-05T14:57:42.410Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69901aedc9e1ff5ad86893e5
Added to database: 2/14/2026, 6:49:17 AM
Last enriched: 2/14/2026, 7:05:00 AM
Last updated: 2/21/2026, 12:20:13 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.