Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3368: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fahadmahmood Injection Guard

0
High
VulnerabilityCVE-2026-3368cvecve-2026-3368cwe-79
Published: Fri Mar 20 2026 (03/20/2026, 23:25:10 UTC)
Source: CVE Database V5
Vendor/Project: fahadmahmood
Product: Injection Guard

Description

The Injection Guard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via malicious query parameter names in all versions up to and including 1.2.9. This is due to insufficient input sanitization in the sanitize_ig_data() function which only sanitizes array values but not array keys, combined with missing output escaping in the ig_settings.php template where stored parameter keys are echoed directly into HTML. When a request is made to the site, the plugin captures the query string via $_SERVER['QUERY_STRING'], applies esc_url_raw() (which preserves URL-encoded special characters like %22, %3E, %3C), then passes it to parse_str() which URL-decodes the string, resulting in decoded HTML/JavaScript in the array keys. These keys are stored via update_option('ig_requests_log') and later rendered without esc_html() or esc_attr() on the admin log page. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in the admin log page that execute whenever an administrator views the Injection Guard log interface.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:39:53 UTC

Technical Analysis

The Injection Guard plugin for WordPress, developed by fahadmahmood, suffers from a stored cross-site scripting vulnerability (CVE-2026-3368) due to improper input neutralization (CWE-79). The vulnerability exists in all versions up to and including 1.2.9. The root cause is insufficient sanitization of query parameter keys in the sanitize_ig_data() function, which sanitizes only array values but neglects array keys. When a request is made, the plugin captures the raw query string from $_SERVER['QUERY_STRING'], applies esc_url_raw(), which does not fully encode special characters, and then uses parse_str() to decode the string. This process results in decoded HTML or JavaScript code embedded in the array keys. These keys are stored persistently using update_option('ig_requests_log'). Later, when the admin views the Injection Guard log page (ig_settings.php), these stored keys are output directly into HTML without proper escaping functions like esc_html() or esc_attr(), enabling stored XSS. An unauthenticated attacker can craft a malicious URL with specially crafted query parameters that inject JavaScript into the admin interface. When an administrator accesses the log page, the malicious script executes in their browser context, potentially allowing session hijacking, credential theft, or further administrative actions. The vulnerability has a CVSS 3.1 base score of 7.2 (high), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and a scope change with partial confidentiality and integrity impact but no availability impact. No public exploits are currently known, but the vulnerability's characteristics make it a critical concern for sites using this plugin.

Potential Impact

This vulnerability poses a significant risk to organizations running WordPress sites with the Injection Guard plugin installed. Since exploitation requires no authentication and can be triggered remotely, attackers can inject persistent malicious scripts that execute in the context of site administrators. This can lead to administrative account compromise, theft of sensitive credentials, unauthorized changes to site configurations, or deployment of further malware. The scope of impact extends to any organization relying on the plugin for security monitoring, as the logs themselves become an attack vector. Compromise of administrative accounts can cascade into full site takeover, data breaches, and reputational damage. Given WordPress's widespread use globally, the vulnerability could affect a broad range of sectors including e-commerce, government, education, and media. The absence of known exploits in the wild currently limits immediate widespread damage, but the vulnerability is likely to attract attackers once publicized, increasing risk over time.

Mitigation Recommendations

1. Immediate upgrade: Apply any available patches or updates from the plugin developer addressing this vulnerability. If no patch exists, consider disabling or uninstalling the Injection Guard plugin until a fix is released. 2. Input sanitization: Developers should modify sanitize_ig_data() to sanitize both array keys and values, ensuring no malicious code can be stored. 3. Output escaping: Ensure all data rendered in the admin log page is properly escaped using WordPress functions such as esc_html() or esc_attr() to prevent script execution. 4. Access control: Restrict access to the Injection Guard log page to trusted administrators only, and consider additional authentication layers or IP whitelisting. 5. Monitoring: Implement monitoring for suspicious query strings and unusual admin log page access patterns. 6. Web Application Firewall (WAF): Deploy WAF rules to detect and block malicious query parameters targeting this vulnerability. 7. Security awareness: Educate administrators to be cautious when accessing plugin logs and to report unexpected behaviors. 8. Backup: Maintain regular backups of site data and configurations to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-27T21:15:02.411Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdda56b462d409683a8bf4

Added to database: 3/20/2026, 11:37:58 PM

Last enriched: 3/20/2026, 11:39:53 PM

Last updated: 3/21/2026, 1:20:18 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses