Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2432: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativemindssolutions CM Custom Reports – Flexible reporting to track what matters most

0
Medium
VulnerabilityCVE-2026-2432cvecve-2026-2432cwe-79
Published: Fri Mar 20 2026 (03/20/2026, 08:25:58 UTC)
Source: CVE Database V5
Vendor/Project: creativemindssolutions
Product: CM Custom Reports – Flexible reporting to track what matters most

Description

CVE-2026-2432 is a stored Cross-Site Scripting (XSS) vulnerability in the CM Custom Reports WordPress plugin, affecting all versions up to 1. 2. 7. It allows authenticated users with administrator-level permissions or higher to inject malicious scripts via the admin settings. The vulnerability specifically impacts multi-site WordPress installations or those with unfiltered_html disabled. Exploitation requires high privileges and no user interaction, with a medium CVSS score of 4. 4. Successful exploitation can lead to limited confidentiality and integrity impacts but does not affect availability. No known exploits are currently reported in the wild. Organizations using this plugin in multi-site environments should prioritize patching or mitigating this issue to prevent potential script injection attacks.

AI-Powered Analysis

AILast updated: 03/20/2026, 09:09:52 UTC

Technical Analysis

CVE-2026-2432 is a stored Cross-Site Scripting (XSS) vulnerability categorized under CWE-79, found in the CM Custom Reports – Flexible reporting to track what matters most plugin for WordPress. This vulnerability exists in all plugin versions up to and including 1.2.7 due to insufficient input sanitization and output escaping in the plugin's admin settings interface. The flaw allows authenticated attackers with administrator-level permissions or higher to inject arbitrary JavaScript code into pages generated by the plugin. These malicious scripts execute whenever any user accesses the compromised page, potentially enabling session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The vulnerability is constrained to multi-site WordPress installations or those where the unfiltered_html capability is disabled, limiting its scope. The CVSS v3.1 base score is 4.4, reflecting a medium severity with network attack vector, high attack complexity, and requiring high privileges but no user interaction. No public exploits have been reported yet, and no official patches are linked, indicating the need for manual mitigation or vendor updates. The vulnerability's impact is primarily on confidentiality and integrity, as attackers can execute scripts that may steal sensitive data or manipulate site content.

Potential Impact

The vulnerability poses a moderate risk to organizations using the affected WordPress plugin in multi-site environments or with unfiltered_html disabled. Attackers with administrator privileges can inject persistent malicious scripts, potentially compromising user sessions, stealing sensitive information, or performing unauthorized actions within the WordPress dashboard. While the attack requires high privileges, the impact on confidentiality and integrity can be significant if exploited, especially in environments with multiple administrators or users accessing the injected pages. The vulnerability does not affect availability, so denial of service is unlikely. Organizations relying on this plugin for reporting may face reputational damage and data integrity issues if exploited. Since no known exploits are currently in the wild, the risk is somewhat mitigated, but the presence of the vulnerability necessitates prompt remediation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2026-2432, organizations should first check if they are running multi-site WordPress installations or have unfiltered_html disabled, as single-site installations with unfiltered_html enabled are not affected. Immediate steps include restricting administrator access to trusted personnel only, minimizing the number of users with high privileges. Until an official patch is released, consider disabling or uninstalling the CM Custom Reports plugin to eliminate the attack surface. If disabling is not feasible, implement Web Application Firewall (WAF) rules to detect and block suspicious script injection attempts in admin settings. Regularly audit and sanitize all inputs in the plugin’s admin interface manually if possible. Monitor logs for unusual administrator activity or unexpected script injections. Stay updated with vendor announcements for patches and apply them promptly once available. Additionally, educate administrators on the risks of stored XSS and enforce strong authentication and session management practices to reduce exploitation impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-12T21:17:51.101Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd0b4ce32a4fbe5f4933aa

Added to database: 3/20/2026, 8:54:36 AM

Last enriched: 3/20/2026, 9:09:52 AM

Last updated: 3/20/2026, 11:31:37 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses