CVE-2026-22388
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-01-27

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Imran Emu Owl Carousel WP owl-carousel-wp allows Stored XSS.This issue affects Owl Carousel WP: from n/a through <= 2.2.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-01-27
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
imran_emu owl_carousel_wp to 2.2.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-22388 is a Cross Site Scripting (XSS) vulnerability in the WordPress Owl Carousel WP Plugin (versions up to and including 2.2.2). It allows a malicious actor to inject and execute malicious scripts such as redirects, advertisements, or other HTML payloads on websites using the affected plugin. Exploitation requires interaction by a privileged user, like an Editor or Developer, who must perform an action such as clicking a malicious link, visiting a crafted page, or submitting a form. [1]


How can this vulnerability impact me? :

This vulnerability can lead to the execution of malicious scripts on your website, potentially causing unwanted redirects, displaying unauthorized advertisements, or other harmful HTML payloads. However, the impact is limited because exploitation requires a privileged user to interact with malicious content. The vulnerability is considered low priority with a CVSS score of 5.9 and is unlikely to be widely exploited. [1]


What immediate steps should I take to mitigate this vulnerability?

Since no official fix or patched version is currently available, immediate mitigation steps include restricting privileged user actions (such as Editors or Developers) from interacting with untrusted links or content, monitoring user activities closely, and applying strict input validation or sanitization where possible. Additionally, consider limiting plugin usage or disabling it temporarily until a patch is released. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart