CVE-2026-0627
BaseFortify
Publication date: 2026-01-09
Last updated on: 2026-01-09
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unknown_vendor | accelerated_mobile_pages | to 1.1.10 (inc) |
| unknown_vendor | accelerated_mobile_pages | 1.1.11 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-0627 is a stored Cross-Site Scripting (XSS) vulnerability in the AMP for WP WordPress plugin, affecting all versions up to and including 1.1.10. The vulnerability arises because the plugin insufficiently sanitizes SVG file uploads: it only removes <script> tags but allows other XSS vectors such as event handler attributes (like onload, onerror), foreignObject elements, and SVG animation attributes. Authenticated users with Author-level access or higher can upload malicious SVG files containing these vectors, which then execute arbitrary scripts whenever any user views the uploaded SVG file. This can lead to unauthorized script execution within the context of the affected website. [2, 4]
How can this vulnerability impact me? :
This vulnerability can allow authenticated users with Author-level or higher privileges to inject malicious scripts into SVG files uploaded to the website. When other users view these SVG files, the malicious scripts execute in their browsers, potentially leading to theft of user credentials, session hijacking, defacement, or other malicious actions. Since the scripts run in the context of the vulnerable website, it can compromise site integrity and user security without requiring user interaction beyond viewing the SVG content. [2, 4]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring uploads of SVG files to the WordPress site, especially from authenticated users with Author-level access or higher. You can check for SVG files uploaded recently and inspect their content for suspicious event handler attributes (like onload, onerror) or foreignObject elements that are not properly sanitized. Commands to detect potentially malicious SVG files could include searching the uploads directory for SVG files and scanning them for event handler attributes or foreignObject tags. For example, on a Linux server hosting the WordPress site, you could run commands like: 1) Find SVG files uploaded recently: `find /path/to/wp-content/uploads/ -name '*.svg' -mtime -7` (to find SVG files modified in the last 7 days). 2) Search for event handler attributes or foreignObject elements inside SVG files: `grep -r -i -E 'onload|onerror|onmouseover|foreignObject' /path/to/wp-content/uploads/*.svg`. Additionally, reviewing web server logs for POST requests to the media upload endpoints by authenticated users can help detect suspicious upload activity. However, no specific detection commands are provided in the resources.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the AMP for WP plugin to version 1.1.11 or later, where the vulnerability CVE-2026-0627 has been fixed. The fix includes thorough sanitization of uploaded SVG files by removing script tags, foreignObject elements, and event handler attributes that could be exploited for stored XSS attacks. If updating immediately is not possible, you can temporarily disable SVG uploads or restrict upload permissions to trusted users only. Additionally, ensure that the plugin's sanitization functions are active and not bypassed by filters. Applying the patch described in the plugin's features.php file (version 1.1.11) will sanitize SVG uploads using DOMDocument and regex-based methods to prevent malicious SVG content from being stored and executed. [2, 4]