Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2718: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dealia Dealia – Request a quote

0
Medium
VulnerabilityCVE-2026-2718cvecve-2026-2718cwe-79
Published: Thu Feb 19 2026 (02/19/2026, 09:26:36 UTC)
Source: CVE Database V5
Vendor/Project: dealia
Product: Dealia – Request a quote

Description

The Dealia – Request a Quote plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Gutenberg block attributes in all versions up to, and including, 1.0.8. This is due to the use of `wp_kses()` for output escaping within HTML attribute contexts where `esc_attr()` is required. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:13:02 UTC

Technical Analysis

CVE-2026-2718 is a stored cross-site scripting vulnerability identified in the Dealia – Request a Quote plugin for WordPress, affecting all versions up to and including 1.0.6. The root cause is the improper neutralization of input during web page generation, specifically the use of the wp_kses() function for output escaping within HTML attribute contexts where esc_attr() is the appropriate function. This misuse allows authenticated users with Contributor-level permissions or higher to inject arbitrary JavaScript code into Gutenberg block attributes. Because the injected scripts are stored and rendered whenever a page is accessed, any user visiting the compromised page will execute the malicious script in their browser context. This can lead to theft of session cookies, privilege escalation, or other malicious actions. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and has a CVSS v3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity with a scope change. No public exploits have been reported yet, but the vulnerability is significant due to the wide use of WordPress and the plugin’s functionality. The issue stems from a developer error in escaping output in HTML attributes, which is a common source of XSS vulnerabilities. The plugin’s reliance on wp_kses(), which is designed for filtering HTML content but not for escaping attribute values, results in insufficient sanitization. Proper mitigation requires replacing wp_kses() with esc_attr() in the affected code paths. Since the vulnerability requires authenticated access at Contributor level or above, it limits exploitation to users with some level of trust, but this is a common permission level in many WordPress sites. The vulnerability allows attackers to persistently inject scripts that can affect any user viewing the page, including administrators.

Potential Impact

The impact of CVE-2026-2718 is primarily on the confidentiality and integrity of affected WordPress sites using the Dealia – Request a Quote plugin. Successful exploitation allows an attacker with Contributor-level access to inject persistent malicious scripts that execute in the browsers of any users visiting the infected pages. This can lead to session hijacking, theft of sensitive information, unauthorized actions performed on behalf of users, defacement, or further malware distribution. While availability is not directly impacted, the reputational damage and potential data breaches can be severe. Organizations relying on this plugin for quote requests may face customer trust issues and compliance risks if user data is compromised. The vulnerability’s requirement for authenticated access reduces the attack surface but does not eliminate risk, especially in environments with multiple contributors or weak user management. Since WordPress powers a significant portion of websites globally, and plugins like Dealia are used in various industries, the scope of affected systems is broad. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future attacks. Overall, the vulnerability poses a medium risk that can escalate if combined with other vulnerabilities or social engineering.

Mitigation Recommendations

To mitigate CVE-2026-2718, organizations should immediately update the Dealia – Request a Quote plugin to a version that addresses this vulnerability once available. If no patch is currently released, manual code review and modification should be performed to replace wp_kses() with esc_attr() for output escaping in HTML attribute contexts within Gutenberg blocks. Additionally, restrict Contributor-level permissions to trusted users only and audit existing user roles to minimize the risk of malicious insiders. Implement a Web Application Firewall (WAF) with rules to detect and block common XSS payloads targeting this plugin. Regularly scan the website for injected scripts or anomalous content in pages using the plugin. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Monitor logs for suspicious activities related to content editing or user actions at Contributor level or above. Educate site administrators and contributors about the risks of XSS and safe content practices. Finally, maintain regular backups to enable quick restoration if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-18T21:01:51.626Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996de3e6aea4a407a4fb0f7

Added to database: 2/19/2026, 9:56:14 AM

Last enriched: 2/28/2026, 2:13:02 PM

Last updated: 4/9/2026, 8:42:07 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses