Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2593: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpsoul Greenshift – animation and page builder blocks

0
Medium
VulnerabilityCVE-2026-2593cvecve-2026-2593cwe-79
Published: Thu Mar 05 2026 (03/05/2026, 21:24:06 UTC)
Source: CVE Database V5
Vendor/Project: wpsoul
Product: Greenshift – animation and page builder blocks

Description

CVE-2026-2593 is a stored cross-site scripting (XSS) vulnerability in the Greenshift – animation and page builder blocks WordPress plugin, affecting all versions up to 12. 8. 5. Authenticated users with Contributor-level access or higher can inject malicious scripts via the _gspb_post_css post meta and dynamicAttributes block attribute due to insufficient input sanitization and output escaping. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or other malicious actions. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with no user interaction required but authentication needed. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WordPress sites using this plugin, which are widespread globally, especially in countries with high WordPress adoption.

AI-Powered Analysis

AILast updated: 03/05/2026, 22:00:25 UTC

Technical Analysis

CVE-2026-2593 is a stored cross-site scripting (XSS) vulnerability identified in the Greenshift – animation and page builder blocks plugin for WordPress, affecting all versions up to and including 12.8.5. The vulnerability arises from improper neutralization of input during web page generation, specifically through the _gspb_post_css post meta value and the dynamicAttributes block attribute. These inputs are insufficiently sanitized and escaped before being rendered, allowing authenticated users with Contributor-level access or higher to inject arbitrary JavaScript code into pages. When other users access these compromised pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, defacement, or further exploitation such as privilege escalation or data theft. The vulnerability requires authentication but no additional user interaction, and it affects the confidentiality and integrity of affected sites. The CVSS 3.1 base score is 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. No public exploit code or active exploitation has been reported yet. The vulnerability is cataloged under CWE-79, which covers cross-site scripting issues. This plugin is used globally on WordPress sites, which are a significant portion of the web, making the vulnerability relevant to many organizations relying on WordPress for content management and web presence.

Potential Impact

The impact of CVE-2026-2593 can be significant for organizations using the Greenshift plugin on WordPress sites. Successful exploitation allows authenticated contributors to inject persistent malicious scripts that execute in the browsers of any user visiting the affected pages. This can lead to session hijacking, theft of sensitive information such as cookies or credentials, unauthorized actions performed on behalf of users, defacement, or distribution of malware. Because the vulnerability affects the integrity and confidentiality of web content and user data, it can damage organizational reputation and trust. The requirement for contributor-level access limits the attack surface but does not eliminate risk, especially in environments with multiple contributors or where contributor accounts may be compromised. The vulnerability does not impact availability directly but can indirectly cause service disruption through defacement or cleanup efforts. Given WordPress’s widespread use, especially in small to medium businesses, non-profits, and personal sites, the scope is broad. Organizations with high-value targets or sensitive data on WordPress sites are at greater risk. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks.

Mitigation Recommendations

To mitigate CVE-2026-2593, organizations should first update the Greenshift plugin to a patched version once available. In the absence of an official patch, administrators should restrict Contributor-level access strictly to trusted users and review existing contributor accounts for suspicious activity. Implement input validation and output escaping controls at the application level if possible, especially for the _gspb_post_css post meta and dynamicAttributes block attribute. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting these parameters. Regularly audit WordPress plugins and themes for vulnerabilities and remove unused or outdated components. Enable Content Security Policy (CSP) headers to limit the impact of injected scripts. Monitor logs and user activity for signs of exploitation attempts or anomalous behavior. Educate contributors on secure content practices and the risks of injecting untrusted code. Finally, maintain regular backups of site content to enable rapid recovery if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-16T16:48:44.399Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a9f99ec48b3f10ff5cf16f

Added to database: 3/5/2026, 9:46:06 PM

Last enriched: 3/5/2026, 10:00:25 PM

Last updated: 3/5/2026, 11:49:26 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses