CVE-2026-26370: Cross-site scripting (XSS) in Ays Pro Survey Maker
WordPress Plugin "Survey Maker" versions 5.1.7.7 and prior contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed in the user's web browser.
AI Analysis
Technical Summary
CVE-2026-26370 is a cross-site scripting (XSS) vulnerability identified in the WordPress plugin 'Survey Maker' by Ays Pro, affecting versions 5.1.7.7 and prior. XSS vulnerabilities occur when an application allows untrusted input to be included in web pages without proper sanitization, enabling attackers to inject malicious scripts that execute in the browsers of users who view the compromised content. In this case, the vulnerability allows an attacker to execute arbitrary JavaScript in the context of the affected website, potentially leading to session hijacking, credential theft, or redirection to malicious sites. The vulnerability requires no privileges (PR:N), has low attack complexity (AC:L), but does require user interaction (UI:R), such as clicking a malicious link or interacting with a crafted survey. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, possibly impacting the entire site or user session. The CVSS 3.0 base score of 6.1 reflects a medium severity, with limited confidentiality and integrity impact and no availability impact. No public exploits have been reported yet, but the presence of this vulnerability in a popular WordPress plugin makes it a potential target for attackers. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for interim mitigations. The vulnerability is particularly relevant for websites using the Survey Maker plugin to collect user input, as malicious payloads could be injected into surveys or forms.
Potential Impact
The exploitation of this XSS vulnerability can lead to unauthorized script execution in users' browsers, which may result in session hijacking, theft of sensitive information such as cookies or credentials, defacement of the website, or redirection to malicious sites. For organizations, this can damage reputation, lead to data breaches, and undermine user trust. Since the vulnerability affects a WordPress plugin, the impact is primarily on websites using this plugin, which could include businesses, educational institutions, and other organizations relying on Survey Maker for user engagement. The medium severity score reflects that while the vulnerability is exploitable remotely without authentication, it requires user interaction and does not directly compromise server availability or critical backend systems. However, successful exploitation could facilitate further attacks or phishing campaigns. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once exploit code becomes available.
Mitigation Recommendations
Organizations should monitor the vendor's communications for an official patch and apply it promptly once released. Until a patch is available, administrators can mitigate risk by disabling or removing the vulnerable Survey Maker plugin if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block common XSS attack patterns can reduce exposure. Input validation and output encoding should be enforced on all user-supplied data within the plugin's context, if customization is possible. Educating users to avoid clicking suspicious links or interacting with untrusted surveys can reduce the likelihood of successful exploitation. Regular security audits and vulnerability scanning of WordPress plugins should be part of the security posture to detect similar issues proactively. Additionally, restricting plugin installation and updates to trusted administrators minimizes the risk of introducing vulnerable components.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Japan, Netherlands, Italy, Spain
CVE-2026-26370: Cross-site scripting (XSS) in Ays Pro Survey Maker
Description
WordPress Plugin "Survey Maker" versions 5.1.7.7 and prior contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed in the user's web browser.
AI-Powered Analysis
Technical Analysis
CVE-2026-26370 is a cross-site scripting (XSS) vulnerability identified in the WordPress plugin 'Survey Maker' by Ays Pro, affecting versions 5.1.7.7 and prior. XSS vulnerabilities occur when an application allows untrusted input to be included in web pages without proper sanitization, enabling attackers to inject malicious scripts that execute in the browsers of users who view the compromised content. In this case, the vulnerability allows an attacker to execute arbitrary JavaScript in the context of the affected website, potentially leading to session hijacking, credential theft, or redirection to malicious sites. The vulnerability requires no privileges (PR:N), has low attack complexity (AC:L), but does require user interaction (UI:R), such as clicking a malicious link or interacting with a crafted survey. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, possibly impacting the entire site or user session. The CVSS 3.0 base score of 6.1 reflects a medium severity, with limited confidentiality and integrity impact and no availability impact. No public exploits have been reported yet, but the presence of this vulnerability in a popular WordPress plugin makes it a potential target for attackers. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for interim mitigations. The vulnerability is particularly relevant for websites using the Survey Maker plugin to collect user input, as malicious payloads could be injected into surveys or forms.
Potential Impact
The exploitation of this XSS vulnerability can lead to unauthorized script execution in users' browsers, which may result in session hijacking, theft of sensitive information such as cookies or credentials, defacement of the website, or redirection to malicious sites. For organizations, this can damage reputation, lead to data breaches, and undermine user trust. Since the vulnerability affects a WordPress plugin, the impact is primarily on websites using this plugin, which could include businesses, educational institutions, and other organizations relying on Survey Maker for user engagement. The medium severity score reflects that while the vulnerability is exploitable remotely without authentication, it requires user interaction and does not directly compromise server availability or critical backend systems. However, successful exploitation could facilitate further attacks or phishing campaigns. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks once exploit code becomes available.
Mitigation Recommendations
Organizations should monitor the vendor's communications for an official patch and apply it promptly once released. Until a patch is available, administrators can mitigate risk by disabling or removing the vulnerable Survey Maker plugin if feasible. Implementing a Web Application Firewall (WAF) with rules to detect and block common XSS attack patterns can reduce exposure. Input validation and output encoding should be enforced on all user-supplied data within the plugin's context, if customization is possible. Educating users to avoid clicking suspicious links or interacting with untrusted surveys can reduce the likelihood of successful exploitation. Regular security audits and vulnerability scanning of WordPress plugins should be part of the security posture to detect similar issues proactively. Additionally, restricting plugin installation and updates to trusted administrators minimizes the risk of introducing vulnerable components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2026-02-16T00:13:00.474Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699814672c4d84f260b0ab28
Added to database: 2/20/2026, 7:59:35 AM
Last enriched: 2/20/2026, 8:13:55 AM
Last updated: 2/20/2026, 9:41:46 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26050: Uncontrolled Search Path Element in Ricoh Company, Ltd. ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール
HighCVE-2025-59819: Vulnerability in zenitel alphacom_xe_audio_server
MediumCVE-2025-71250
LowCVE-2025-71249
LowCVE-2025-71248
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.