CVE-2026-2277: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in larsdrasmussen rexCrawler
The rexCrawler plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' and 'regex' parameters in the search-pattern tester page in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2026-2277 is a reflected Cross-Site Scripting vulnerability classified under CWE-79 found in the rexCrawler plugin for WordPress, developed by larsdrasmussen. The vulnerability exists in all versions up to and including 1.0.15, specifically in the search-pattern tester page where the 'url' and 'regex' parameters are not properly sanitized or escaped before being reflected in the page output. This improper neutralization allows an attacker to inject malicious JavaScript code that executes in the context of an administrator's browser session. Exploitation requires no authentication but does require user interaction, such as an administrator clicking a maliciously crafted link. The vulnerability only affects WordPress multi-site installations or those where the unfiltered_html capability is disabled, limiting the scope but still posing a significant risk. The reflected XSS can lead to session hijacking, privilege escalation, or other malicious actions performed with the administrator's privileges. The CVSS v3.1 score of 6.1 reflects medium severity, with network attack vector, low attack complexity, no privileges required, user interaction needed, and a scope change due to potential impact beyond the vulnerable component. No patches or known exploits are currently available, emphasizing the need for proactive mitigation.
Potential Impact
The primary impact of CVE-2026-2277 is the potential compromise of administrative accounts on WordPress multi-site installations using the rexCrawler plugin. Successful exploitation allows attackers to execute arbitrary scripts in the administrator's browser, which can lead to session hijacking, unauthorized actions within the WordPress dashboard, data theft, or deployment of further malware. This can undermine the integrity and confidentiality of the affected websites and potentially disrupt availability if attackers modify or delete critical content. Since the vulnerability requires user interaction but no authentication, phishing or social engineering attacks could be used to trick administrators. The impact is particularly significant for organizations relying on WordPress multi-site setups for managing multiple websites, including enterprises, educational institutions, and media companies. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities rapidly once disclosed.
Mitigation Recommendations
1. Immediately update the rexCrawler plugin to a patched version once available from the vendor or disable the plugin if an update is not yet released. 2. Restrict access to the search-pattern tester page to trusted administrators only, using web application firewall (WAF) rules or IP whitelisting. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the admin interface. 4. Educate administrators about the risks of clicking on unsolicited or suspicious links, especially those targeting the WordPress admin area. 5. Enable multi-factor authentication (MFA) for all administrator accounts to reduce the impact of session hijacking. 6. Regularly audit and monitor WordPress logs for unusual activity or access attempts related to the rexCrawler plugin. 7. If possible, enable the unfiltered_html capability cautiously, as its disabling is a condition for this vulnerability, but weigh this against other security considerations. 8. Employ security plugins that can detect and block reflected XSS attempts in real-time.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2026-2277: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in larsdrasmussen rexCrawler
Description
The rexCrawler plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' and 'regex' parameters in the search-pattern tester page in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2277 is a reflected Cross-Site Scripting vulnerability classified under CWE-79 found in the rexCrawler plugin for WordPress, developed by larsdrasmussen. The vulnerability exists in all versions up to and including 1.0.15, specifically in the search-pattern tester page where the 'url' and 'regex' parameters are not properly sanitized or escaped before being reflected in the page output. This improper neutralization allows an attacker to inject malicious JavaScript code that executes in the context of an administrator's browser session. Exploitation requires no authentication but does require user interaction, such as an administrator clicking a maliciously crafted link. The vulnerability only affects WordPress multi-site installations or those where the unfiltered_html capability is disabled, limiting the scope but still posing a significant risk. The reflected XSS can lead to session hijacking, privilege escalation, or other malicious actions performed with the administrator's privileges. The CVSS v3.1 score of 6.1 reflects medium severity, with network attack vector, low attack complexity, no privileges required, user interaction needed, and a scope change due to potential impact beyond the vulnerable component. No patches or known exploits are currently available, emphasizing the need for proactive mitigation.
Potential Impact
The primary impact of CVE-2026-2277 is the potential compromise of administrative accounts on WordPress multi-site installations using the rexCrawler plugin. Successful exploitation allows attackers to execute arbitrary scripts in the administrator's browser, which can lead to session hijacking, unauthorized actions within the WordPress dashboard, data theft, or deployment of further malware. This can undermine the integrity and confidentiality of the affected websites and potentially disrupt availability if attackers modify or delete critical content. Since the vulnerability requires user interaction but no authentication, phishing or social engineering attacks could be used to trick administrators. The impact is particularly significant for organizations relying on WordPress multi-site setups for managing multiple websites, including enterprises, educational institutions, and media companies. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities rapidly once disclosed.
Mitigation Recommendations
1. Immediately update the rexCrawler plugin to a patched version once available from the vendor or disable the plugin if an update is not yet released. 2. Restrict access to the search-pattern tester page to trusted administrators only, using web application firewall (WAF) rules or IP whitelisting. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the admin interface. 4. Educate administrators about the risks of clicking on unsolicited or suspicious links, especially those targeting the WordPress admin area. 5. Enable multi-factor authentication (MFA) for all administrator accounts to reduce the impact of session hijacking. 6. Regularly audit and monitor WordPress logs for unusual activity or access attempts related to the rexCrawler plugin. 7. If possible, enable the unfiltered_html capability cautiously, as its disabling is a condition for this vulnerability, but weigh this against other security considerations. 8. Employ security plugins that can detect and block reflected XSS attempts in real-time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-10T14:09:17.220Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69be180bf4197a8e3b784272
Added to database: 3/21/2026, 4:01:15 AM
Last enriched: 3/21/2026, 4:46:47 AM
Last updated: 3/22/2026, 7:18:44 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.