CVE-2026-0627
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-09

Last updated on: 2026-01-09

Assigner: Wordfence

Description
The AMP for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 1.1.10. This is due to insufficient sanitization of SVG file content that only removes `<script>` tags while allowing other XSS vectors such as event handlers (onload, onerror, onmouseover), foreignObject elements, and SVG animation attributes. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts via malicious SVG file uploads that will execute whenever a user views the uploaded file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-09
Last Modified
2026-01-09
Generated
2026-05-07
AI Q&A
2026-01-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
unknown_vendor accelerated_mobile_pages to 1.1.10 (inc)
unknown_vendor accelerated_mobile_pages 1.1.11
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-0627 is a stored Cross-Site Scripting (XSS) vulnerability in the AMP for WP WordPress plugin, affecting all versions up to and including 1.1.10. The vulnerability arises because the plugin insufficiently sanitizes SVG file uploads: it only removes <script> tags but allows other XSS vectors such as event handler attributes (like onload, onerror), foreignObject elements, and SVG animation attributes. Authenticated users with Author-level access or higher can upload malicious SVG files containing these vectors, which then execute arbitrary scripts whenever any user views the uploaded SVG file. This can lead to unauthorized script execution within the context of the affected website. [2, 4]


How can this vulnerability impact me? :

This vulnerability can allow authenticated users with Author-level or higher privileges to inject malicious scripts into SVG files uploaded to the website. When other users view these SVG files, the malicious scripts execute in their browsers, potentially leading to theft of user credentials, session hijacking, defacement, or other malicious actions. Since the scripts run in the context of the vulnerable website, it can compromise site integrity and user security without requiring user interaction beyond viewing the SVG content. [2, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring uploads of SVG files to the WordPress site, especially from authenticated users with Author-level access or higher. You can check for SVG files uploaded recently and inspect their content for suspicious event handler attributes (like onload, onerror) or foreignObject elements that are not properly sanitized. Commands to detect potentially malicious SVG files could include searching the uploads directory for SVG files and scanning them for event handler attributes or foreignObject tags. For example, on a Linux server hosting the WordPress site, you could run commands like: 1) Find SVG files uploaded recently: `find /path/to/wp-content/uploads/ -name '*.svg' -mtime -7` (to find SVG files modified in the last 7 days). 2) Search for event handler attributes or foreignObject elements inside SVG files: `grep -r -i -E 'onload|onerror|onmouseover|foreignObject' /path/to/wp-content/uploads/*.svg`. Additionally, reviewing web server logs for POST requests to the media upload endpoints by authenticated users can help detect suspicious upload activity. However, no specific detection commands are provided in the resources.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the AMP for WP plugin to version 1.1.11 or later, where the vulnerability CVE-2026-0627 has been fixed. The fix includes thorough sanitization of uploaded SVG files by removing script tags, foreignObject elements, and event handler attributes that could be exploited for stored XSS attacks. If updating immediately is not possible, you can temporarily disable SVG uploads or restrict upload permissions to trusted users only. Additionally, ensure that the plugin's sanitization functions are active and not bypassed by filters. Applying the patch described in the plugin's features.php file (version 1.1.11) will sanitize SVG uploads using DOMDocument and regex-based methods to prevent malicious SVG content from being stored and executed. [2, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart