CVE-2026-1792
BaseFortify
Publication date: 2026-02-14
Last updated on: 2026-02-18
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| geowidget | geowidget | to 1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Geo Widget plugin for WordPress, up to and including version 1.0, is vulnerable to Stored Cross-Site Scripting (XSS) due to insufficient input sanitization and output escaping.
This vulnerability allows unauthenticated attackers to inject arbitrary web scripts into pages via the URL path or plugin configuration fields.
When a user accesses a page containing the injected script, the malicious code executes in their browser.
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'This vulnerability can lead to attackers executing malicious scripts in the context of your website.'}, {'type': 'list_item', 'content': 'Attackers can steal user session cookies or credentials.'}, {'type': 'list_item', 'content': 'They can perform actions on behalf of users or redirect users to malicious sites.'}, {'type': 'list_item', 'content': "It can damage your website's reputation and trustworthiness."}, {'type': 'list_item', 'content': 'It may lead to unauthorized access or data theft.'}] [2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "The vulnerability in the Geo Widget plugin for WordPress is a Stored Cross-Site Scripting (XSS) issue caused by insufficient input sanitization and output escaping in the plugin's configuration fields."}, {'type': 'paragraph', 'content': 'To detect this vulnerability on your system, you can check if the Geo Widget plugin version 1.0 or earlier is installed and active on your WordPress site.'}, {'type': 'paragraph', 'content': 'You can also inspect the URL paths and plugin configuration pages for injected scripts or suspicious content that executes when accessed.'}, {'type': 'paragraph', 'content': 'Suggested commands or methods include:'}, {'type': 'list_item', 'content': 'Use WP-CLI to list installed plugins and their versions: `wp plugin list`'}, {'type': 'list_item', 'content': "Search plugin files for unsanitized input or output patterns, e.g., grep for echo statements in GeoWidget.php: `grep -i 'echo' wp-content/plugins/geowidget/GeoWidget.php`"}, {'type': 'list_item', 'content': 'Check the WordPress options table for suspicious or injected content in the \'GeoWidget\' option: `wp db query "SELECT option_value FROM wp_options WHERE option_name = \'GeoWidget\';"`'}, {'type': 'list_item', 'content': 'Monitor HTTP requests and responses for injected scripts in pages served by the plugin, using tools like curl or browser developer tools.'}] [2]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'Immediate mitigation steps for the Geo Widget plugin Stored Cross-Site Scripting vulnerability include:'}, {'type': 'list_item', 'content': 'Disable or deactivate the Geo Widget plugin version 1.0 or earlier until a patched version is available.'}, {'type': 'list_item', 'content': "Remove or sanitize any malicious scripts or injected content from the plugin's configuration options stored in the WordPress database."}, {'type': 'list_item', 'content': 'Restrict access to the WordPress admin area to trusted users only, to prevent unauthorized changes to the plugin settings.'}, {'type': 'list_item', 'content': 'Apply strict input validation and output escaping if you maintain or customize the plugin code.'}, {'type': 'list_item', 'content': 'Monitor your site for suspicious activity or unexpected script execution related to the plugin.'}] [2]