CVE-2026-28102
Reflected XSS in UberSlider Classic β€ 2.5 Allows Code Injection
Publication date: 2026-03-05
Last updated on: 2026-03-05
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lambertgroup | uberslider_classic | From 1.0 (inc) to 2.5 (inc) |
| lambertgroup | uberslider_classic | to 2.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-28102 is a medium severity Cross Site Scripting (XSS) vulnerability affecting the WordPress UberSlider Classic Plugin versions up to and including 2.5.'}, {'type': 'paragraph', 'content': 'This vulnerability allows an attacker to inject malicious scriptsβsuch as redirects, advertisements, or other HTML payloadsβinto a website. These scripts execute when visitors access the compromised site.'}, {'type': 'paragraph', 'content': 'It is classified under the OWASP Top 10 category A3: Injection.'}, {'type': 'paragraph', 'content': 'Exploitation requires user interaction by a privileged user who must perform an action like clicking a malicious link, visiting a crafted page, or submitting a form.'}, {'type': 'paragraph', 'content': "The vulnerability can be triggered without authentication, but successful exploitation depends on the privileged user's involvement."}] [1]
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute malicious scripts on your website, which may lead to unauthorized redirects, display of unwanted advertisements, or injection of harmful HTML content.
Such attacks can compromise the integrity and trustworthiness of your website, potentially harming your users and damaging your reputation.
Since the attack requires interaction by a privileged user, it can also lead to further compromise if such users are tricked into executing malicious actions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'CVE-2026-28102 is a reflected Cross Site Scripting (XSS) vulnerability affecting the UberSlider Classic WordPress plugin up to version 2.5. Detection involves identifying attempts to inject malicious scripts via crafted URLs or form submissions targeting the plugin.'}, {'type': 'paragraph', 'content': 'Since the vulnerability is triggered by user interaction with malicious links or pages, monitoring web server logs for suspicious query parameters or payloads that include script tags or encoded HTML can help detect exploitation attempts.'}, {'type': 'paragraph', 'content': 'Commands to help detect potential exploitation attempts might include:'}, {'type': 'list_item', 'content': 'Using grep to search web server access logs for suspicious script tags or typical XSS payloads, e.g., `grep -iE "<script|%3Cscript" /var/log/apache2/access.log`'}, {'type': 'list_item', 'content': 'Using tools like OWASP ZAP or Burp Suite to scan the website for reflected XSS vulnerabilities by submitting crafted inputs to the UberSlider Classic plugin endpoints.'}, {'type': 'list_item', 'content': 'Monitoring HTTP request parameters for unusual or encoded input that could trigger the vulnerability.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
There is currently no official patch available for CVE-2026-28102 affecting UberSlider Classic plugin versions up to 2.5.
Immediate mitigation steps include applying the mitigation rule provided by Patchstack, which can block attacks targeting this vulnerability until an official patch is released.
Additionally, users should:
- Avoid clicking on suspicious links or visiting untrusted pages that might exploit this vulnerability.
- Restrict user privileges to minimize the risk of exploitation by privileged users.
- Monitor website traffic and logs for signs of attempted exploitation.
- Consider disabling or removing the UberSlider Classic plugin if immediate mitigation is not feasible.