CVE-2026-1792
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2026-02-14

Last updated on: 2026-02-18

Assigner: Wordfence

Description
The Geo Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL path in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-14
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
geowidget geowidget to 1.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Geo Widget plugin for WordPress, up to and including version 1.0, is vulnerable to Stored Cross-Site Scripting (XSS) due to insufficient input sanitization and output escaping.

This vulnerability allows unauthenticated attackers to inject arbitrary web scripts into pages via the URL path or plugin configuration fields.

When a user accesses a page containing the injected script, the malicious code executes in their browser.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can lead to attackers executing malicious scripts in the context of your website.'}, {'type': 'list_item', 'content': 'Attackers can steal user session cookies or credentials.'}, {'type': 'list_item', 'content': 'They can perform actions on behalf of users or redirect users to malicious sites.'}, {'type': 'list_item', 'content': "It can damage your website's reputation and trustworthiness."}, {'type': 'list_item', 'content': 'It may lead to unauthorized access or data theft.'}] [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "The vulnerability in the Geo Widget plugin for WordPress is a Stored Cross-Site Scripting (XSS) issue caused by insufficient input sanitization and output escaping in the plugin's configuration fields."}, {'type': 'paragraph', 'content': 'To detect this vulnerability on your system, you can check if the Geo Widget plugin version 1.0 or earlier is installed and active on your WordPress site.'}, {'type': 'paragraph', 'content': 'You can also inspect the URL paths and plugin configuration pages for injected scripts or suspicious content that executes when accessed.'}, {'type': 'paragraph', 'content': 'Suggested commands or methods include:'}, {'type': 'list_item', 'content': 'Use WP-CLI to list installed plugins and their versions: `wp plugin list`'}, {'type': 'list_item', 'content': "Search plugin files for unsanitized input or output patterns, e.g., grep for echo statements in GeoWidget.php: `grep -i 'echo' wp-content/plugins/geowidget/GeoWidget.php`"}, {'type': 'list_item', 'content': 'Check the WordPress options table for suspicious or injected content in the \'GeoWidget\' option: `wp db query "SELECT option_value FROM wp_options WHERE option_name = \'GeoWidget\';"`'}, {'type': 'list_item', 'content': 'Monitor HTTP requests and responses for injected scripts in pages served by the plugin, using tools like curl or browser developer tools.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps for the Geo Widget plugin Stored Cross-Site Scripting vulnerability include:'}, {'type': 'list_item', 'content': 'Disable or deactivate the Geo Widget plugin version 1.0 or earlier until a patched version is available.'}, {'type': 'list_item', 'content': "Remove or sanitize any malicious scripts or injected content from the plugin's configuration options stored in the WordPress database."}, {'type': 'list_item', 'content': 'Restrict access to the WordPress admin area to trusted users only, to prevent unauthorized changes to the plugin settings.'}, {'type': 'list_item', 'content': 'Apply strict input validation and output escaping if you maintain or customize the plugin code.'}, {'type': 'list_item', 'content': 'Monitor your site for suspicious activity or unexpected script execution related to the plugin.'}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart