CVE-2026-1939

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with contributor-level access or higher to inject malicious scripts into WordPress pages, which will run when other users visit those pages. It occurs because the plugin does not properly check or clean up the input it receives, making it easier for attackers to exploit.

Technical Description

The Percent to Infograph plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `percent_to_graph` shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$914($500-$1K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Feb 14, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago