CVE-2026-22438
Reflected XSS in TheBi β€ 1.0.5 Enables Web Attacks
Publication date: 2026-03-05
Last updated on: 2026-03-09
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| thebi | thebi | to 1.0.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
There is no official patch currently available for this vulnerability in TheBi Theme versions up to 1.0.5.
Patchstack has issued a mitigation rule that blocks attacks targeting this flaw until an official patch is released, tested, and safely applied.
It is recommended to immediately apply this mitigation or resolution to protect affected sites from exploitation.
Can you explain this vulnerability to me?
CVE-2026-22438 is a medium priority Cross Site Scripting (XSS) vulnerability affecting the WordPress TheBi Theme versions up to and including 1.0.5.
This vulnerability allows an attacker to inject malicious scriptsβsuch as redirects, advertisements, or other HTML payloadsβinto a website, which execute when visitors access the compromised site.
Exploitation requires user interaction by a privileged user performing actions like clicking a malicious link, visiting a crafted page, or submitting a form.
The vulnerability falls under the OWASP Top 10 category A3: Injection and specifically involves Cross Site Scripting.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute malicious scripts on your website, which can lead to unauthorized redirects, display of unwanted advertisements, or other harmful HTML payloads.
Such attacks can compromise the integrity and trustworthiness of your website, potentially harming your users and damaging your reputation.
Successful exploitation requires privileged user interaction, meaning attackers rely on users with certain permissions to trigger the malicious scripts.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know