Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26370: Cross-site scripting (XSS) in Ays Pro Survey Maker

0
Medium
VulnerabilityCVE-2026-26370cvecve-2026-26370
Published: Fri Feb 20 2026 (02/20/2026, 07:42:15 UTC)
Source: CVE Database V5
Vendor/Project: Ays Pro
Product: Survey Maker

Description

WordPress Plugin "Survey Maker" versions 5.1.7.7 and prior contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed in the user's web browser.

AI-Powered Analysis

AILast updated: 02/20/2026, 08:13:55 UTC

Technical Analysis

CVE-2026-26370 is a cross-site scripting (XSS) vulnerability identified in the WordPress plugin 'Survey Maker' by Ays Pro, affecting versions 5.1.7.7 and prior. XSS vulnerabilities occur when an application allows untrusted input to be included in web pages without proper sanitization, enabling attackers to inject malicious scripts that execute in the browsers of users who view the compromised content. In this case, the vulnerability allows an attacker to execute arbitrary JavaScript in the context of the affected website, potentially leading to session hijacking, credential theft, or redirection to malicious sites. The vulnerability requires no privileges (PR:N), has low attack complexity (AC:L), but does require user interaction (UI:R), such as clicking a malicious link or interacting with a crafted survey. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, possibly impacting the entire site or user session. The CVSS 3.0 base score of 6.1 reflects a medium severity, with limited confidentiality and integrity impact and no availability impact. No public exploits have been reported yet, but the presence of this vulnerability in a popular WordPress plugin makes it a potential target for attackers. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for interim mitigations. The vulnerability is particularly relevant for websites using the Survey Maker plugin to collect user input, as malicious payloads could be injected into surveys or forms.

Potential Impact

The exploitation of this XSS vulnerability can lead to unauthorized script execution in users' browsers, which may result in session hijacking, theft of sensitive information such as cookies or credentials, defacement of the website, or redirection to malicious sites. For organizations, this can damage reputation, lead to data breaches, and undermine user trust. Since the vulnerability affects a WordPress plugin, the impact is primarily on websites using this plugin, which could include businesses, educational institutions, and other organizations relying on Survey Maker for user engagement. The medium severity score reflects that while the vulnerability is exploitable remotely without authentication, it requires user interaction and does not directly compromise server availability or critical backend systems. However, successful exploitation could facilitate further attacks or phishing campaigns. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once exploit code becomes available.

Mitigation Recommendations

Organizations should monitor the vendor's communications for an official patch and apply it promptly once released. Until a patch is available, administrators can mitigate risk by disabling or removing the vulnerable Survey Maker plugin if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block common XSS attack patterns can reduce exposure. Input validation and output encoding should be enforced on all user-supplied data within the plugin's context, if customization is possible. Educating users to avoid clicking suspicious links or interacting with untrusted surveys can reduce the likelihood of successful exploitation. Regular security audits and vulnerability scanning of WordPress plugins should be part of the security posture to detect similar issues proactively. Additionally, restricting plugin installation and updates to trusted administrators minimizes the risk of introducing vulnerable components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2026-02-16T00:13:00.474Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699814672c4d84f260b0ab28

Added to database: 2/20/2026, 7:59:35 AM

Last enriched: 2/20/2026, 8:13:55 AM

Last updated: 2/20/2026, 9:41:46 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats