Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2384: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ays-pro Quiz Maker

0
Medium
VulnerabilityCVE-2026-2384cvecve-2026-2384cwe-79
Published: Fri Feb 20 2026 (02/20/2026, 02:23:32 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Quiz Maker

Description

CVE-2026-2384 is a stored Cross-Site Scripting (XSS) vulnerability in the ays-pro Quiz Maker WordPress plugin, affecting all versions up to 6. 7. 1. 7. It arises from improper input sanitization and output escaping in the plugin's vc_quizmaker shortcode, allowing authenticated users with contributor-level access or higher to inject malicious scripts. These scripts execute whenever any user views the compromised page. The vulnerability requires the WPBakery Page Builder plugin to be active. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low attack complexity but requiring privileges. While no known exploits are reported in the wild, the vulnerability poses risks to confidentiality and integrity due to potential session hijacking or defacement.

AI-Powered Analysis

AILast updated: 02/20/2026, 03:31:46 UTC

Technical Analysis

CVE-2026-2384 is a stored Cross-Site Scripting (XSS) vulnerability identified in the ays-pro Quiz Maker plugin for WordPress, affecting all versions up to and including 6.7.1.7. The vulnerability stems from improper neutralization of input during web page generation, specifically within the vc_quizmaker shortcode. This shortcode fails to adequately sanitize and escape user-supplied attributes, allowing authenticated users with contributor-level access or higher to inject arbitrary JavaScript code into pages. Because the injected scripts are stored persistently, they execute whenever any user accesses the compromised page, potentially leading to session hijacking, privilege escalation, or defacement. Exploitation requires the WPBakery Page Builder plugin to be installed and active, as it provides the context for the shortcode's operation. The vulnerability has a CVSS 3.1 base score of 6.4, indicating medium severity, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with no availability impact. No public exploits have been reported yet. The vulnerability highlights the risks of insufficient input validation in WordPress plugins, especially those that allow user-generated content and complex page building features.

Potential Impact

The primary impact of CVE-2026-2384 is the potential for attackers with contributor-level access to inject malicious scripts that execute in the context of other users visiting the affected pages. This can lead to theft of session cookies, enabling account takeover, unauthorized actions performed on behalf of users, defacement of content, or distribution of malware. Since contributors can create or edit content, the attack surface includes any page or post using the vulnerable shortcode. The confidentiality and integrity of user data and site content are at risk, while availability is not directly affected. Organizations relying on the Quiz Maker plugin for educational or engagement purposes may face reputational damage, loss of user trust, and compliance issues if user data is compromised. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with many contributors or where contributor accounts are not tightly controlled. The dependency on WPBakery Page Builder means that sites not using this plugin are not affected, reducing the overall scope. However, WordPress's widespread use and the popularity of these plugins mean a significant number of sites globally could be vulnerable.

Mitigation Recommendations

To mitigate CVE-2026-2384, organizations should take the following specific actions: 1) Immediately audit and restrict contributor-level user accounts to only trusted individuals, minimizing the risk of malicious script injection. 2) Monitor content created or edited by contributors for suspicious or unexpected scripts, using automated scanning tools or manual review. 3) Disable or remove the Quiz Maker plugin if it is not essential, or disable the vc_quizmaker shortcode until a patch is available. 4) Ensure WPBakery Page Builder is only active if necessary, as its presence is required for exploitation. 5) Apply any vendor-provided patches or updates as soon as they are released. 6) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 7) Educate content creators about the risks of injecting untrusted code and enforce strict input validation policies. 8) Use Web Application Firewalls (WAFs) with rules targeting XSS payloads in shortcode parameters to detect and block exploitation attempts. These measures collectively reduce the likelihood and impact of exploitation beyond generic advice.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-11T22:29:12.029Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6997d231d7880ec89b52f4ea

Added to database: 2/20/2026, 3:17:05 AM

Last enriched: 2/20/2026, 3:31:46 AM

Last updated: 2/20/2026, 4:22:42 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats