CVE-2026-1834
Received Received - Intake
Stored XSS in Ibtana WordPress Plugin 'ive' Shortcode

Publication date: 2026-03-31

Last updated on: 2026-03-31

Assigner: Wordfence

Description
The Ibtana – WordPress Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ive' shortcode in all versions up to, and including, 1.2.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-03-31
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-80 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Ibtana – WordPress Website Builder plugin is a Stored Cross-Site Scripting (XSS) issue affecting all versions up to and including 1.2.5.7. It occurs because the plugin does not properly sanitize and escape user-supplied attributes in its 'ive' shortcode. This allows authenticated users with contributor-level access or higher to inject malicious web scripts into pages. These scripts execute whenever any user views the infected page, potentially compromising user data or site integrity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the Ibtana – WordPress Website Builder plugin allows authenticated attackers with contributor-level access to inject arbitrary web scripts via stored cross-site scripting (XSS). This can lead to unauthorized script execution when users access the injected pages.

Such XSS vulnerabilities can potentially lead to unauthorized access to user data, session hijacking, or data manipulation, which may impact compliance with data protection regulations like GDPR and HIPAA that require safeguarding personal and sensitive information.

However, the provided context does not explicitly describe the direct impact of this vulnerability on compliance with these standards or any specific regulatory requirements.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers with contributor-level access or above to inject arbitrary malicious scripts into your WordPress pages. When other users visit these pages, the injected scripts execute in their browsers, which can lead to theft of sensitive information, session hijacking, defacement, or other malicious actions. Since the vulnerability is a stored XSS, the malicious code persists on the site and affects all visitors to the compromised pages.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability in the Ibtana – WordPress Website Builder plugin is a Stored Cross-Site Scripting (XSS) issue via the 'ive' shortcode, exploitable by authenticated users with contributor-level access or higher.

Detection involves identifying if your WordPress site is running the vulnerable plugin version (up to and including 1.2.5.7) and checking for injected malicious scripts in pages using the 'ive' shortcode.

  • Check the installed version of the Ibtana plugin in your WordPress admin dashboard or by running a command to list installed plugins and their versions.
  • Search your WordPress database posts and pages for the presence of the '[ive]' shortcode with suspicious or unexpected script tags or attributes.
  • Example command to find suspicious shortcode usage in the WordPress database (replace wp_posts with your table prefix): mysql -u username -p -e "SELECT ID, post_title FROM wp_posts WHERE post_content LIKE '%[ive]%<script%' OR post_content LIKE '%[ive]%onerror=%';" your_database_name
  • Use web application scanners or security plugins that detect stored XSS vulnerabilities or anomalous script injections in WordPress content.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the Ibtana Visual Editor WordPress plugin to version 1.2.5.8 or later, which includes security patches that properly sanitize and escape user input to prevent stored XSS attacks.

  • Update the plugin via the WordPress admin dashboard or manually by downloading the fixed version 1.2.5.8.
  • Restrict contributor-level and higher user permissions to trusted users only, as the vulnerability requires authenticated access at this level.
  • Review and clean any content that uses the '[ive]' shortcode for injected malicious scripts.
  • Implement additional security measures such as Web Application Firewalls (WAF) and security plugins that can detect and block XSS payloads.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart