Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2569: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dearhive Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer

0
Medium
VulnerabilityCVE-2026-2569cvecve-2026-2569cwe-79
Published: Tue Mar 10 2026 (03/10/2026, 23:21:12 UTC)
Source: CVE Database V5
Vendor/Project: dearhive
Product: Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer

Description

CVE-2026-2569 is a stored Cross-Site Scripting (XSS) vulnerability in the Dear Flipbook WordPress plugin, affecting all versions up to 2. 4. 20. Authenticated users with Author-level privileges or higher can inject malicious scripts via PDF page labels due to insufficient input sanitization and output escaping. These scripts execute when any user views the infected page, potentially compromising user data and session integrity. The vulnerability has a CVSS score of 6. 4 (medium severity) and does not require user interaction but does require authentication with elevated privileges. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily impacts WordPress sites utilizing this plugin, especially those allowing multiple authors or contributors.

AI-Powered Analysis

AILast updated: 03/10/2026, 23:59:08 UTC

Technical Analysis

CVE-2026-2569 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer plugin for WordPress. This vulnerability arises from improper neutralization of input during web page generation, specifically through PDF page labels. The plugin fails to adequately sanitize and escape user-supplied input embedded in PDF page labels, allowing authenticated users with Author-level access or higher to inject arbitrary JavaScript code. When other users access the affected pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability affects all versions up to and including 2.4.20. Exploitation requires authentication with at least Author privileges but does not require user interaction beyond viewing the infected page. The CVSS v3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed (S:C), indicating that the vulnerability can affect components beyond the vulnerable plugin itself, such as user sessions and data confidentiality. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially multi-author environments. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation.

Potential Impact

The impact of CVE-2026-2569 is primarily on the confidentiality and integrity of affected WordPress sites and their users. Successful exploitation allows attackers to execute arbitrary scripts in the context of the victim’s browser, enabling theft of session cookies, credentials, or other sensitive information. This can lead to account takeover, unauthorized actions, and potential lateral movement within the site. Since the vulnerability is stored XSS, the malicious payload persists and affects all users who view the infected page, amplifying the potential damage. Organizations with multi-author WordPress sites are particularly vulnerable, as attackers need only Author-level access to inject scripts. This can undermine trust in the website, lead to data breaches, and damage organizational reputation. Although availability is not directly impacted, the indirect consequences of compromised user accounts and data leakage can be severe. The medium CVSS score reflects moderate ease of exploitation and significant but not catastrophic impact. The absence of known exploits in the wild currently limits immediate widespread damage but does not preclude future attacks.

Mitigation Recommendations

To mitigate CVE-2026-2569, organizations should first verify if they use the Dear Flipbook plugin and identify the version in use. Immediate steps include restricting Author-level access to trusted users only, minimizing the attack surface. Administrators should monitor and audit PDF page labels and other user-generated content for suspicious scripts. Employing a Web Application Firewall (WAF) with rules to detect and block XSS payloads can provide interim protection. Site owners should disable or remove the plugin if it is not essential until a vendor patch is released. For sites requiring the plugin, consider implementing Content Security Policy (CSP) headers to restrict script execution sources. Regular backups and monitoring for unusual user activity can help detect exploitation attempts. Developers and site administrators should follow up with the vendor for patches or updates addressing this vulnerability and apply them promptly once available. Additionally, educating authors about safe content practices and input validation can reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-15T21:48:01.990Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0acf02f860ef943e36226

Added to database: 3/10/2026, 11:44:48 PM

Last enriched: 3/10/2026, 11:59:08 PM

Last updated: 3/11/2026, 1:10:37 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses