CVE-2026-31918
Received Received - Intake
Stored XSS in immonex Kickstart Allows Persistent Script Injection

Publication date: 2026-03-13

Last updated on: 2026-03-13

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in immonex immonex Kickstart immonex-kickstart allows Stored XSS.This issue affects immonex Kickstart: from n/a through <= 1.13.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-13
Last Modified
2026-03-13
Generated
2026-05-07
AI Q&A
2026-03-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
immonex immonex_kickstart From 1.0 (inc) to 1.13.0 (inc)
immonex immonex_kickstart to 1.13.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-31918 is a Cross Site Scripting (XSS) vulnerability in the WordPress immonex Kickstart Plugin versions up to and including 1.13.0.

This vulnerability occurs due to improper neutralization of input during web page generation, allowing an attacker to inject malicious scripts.

Exploitation requires a privileged user (Contributor or Developer) to interact with a crafted link, page, or form, which then executes malicious scripts when other site visitors access the affected pages.


How can this vulnerability impact me? :

Successful exploitation of this vulnerability allows attackers to inject malicious scripts such as redirects, advertisements, or other HTML payloads that execute in the context of the affected website.

This can lead to compromised user experience, potential theft of user data, or unauthorized actions performed on behalf of users.

However, the vulnerability is considered low priority with no impactful threat reported so far.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'Detection of this vulnerability involves identifying if the immonex Kickstart WordPress plugin version is 1.13.0 or earlier, as these versions are vulnerable to the stored Cross Site Scripting (XSS) issue.'}, {'type': 'paragraph', 'content': 'Since exploitation requires a privileged user interaction, monitoring for suspicious user actions such as clicking unexpected links, visiting crafted pages, or submitting unusual forms can help detect potential exploitation attempts.'}, {'type': 'paragraph', 'content': 'Specific commands to detect the vulnerable plugin version on your WordPress installation include:'}, {'type': 'list_item', 'content': 'Using WP-CLI to check plugin version: `wp plugin list --status=active` and look for immonex-kickstart version.'}, {'type': 'list_item', 'content': "Searching plugin files for version info: `grep -r 'Version:' wp-content/plugins/immonex-kickstart/`"}, {'type': 'list_item', 'content': 'Reviewing web server logs for suspicious requests or payloads that might indicate XSS attempts.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the immonex Kickstart plugin to version 1.13.4 or later, where the vulnerability has been patched.

Additionally, restrict privileged user access to trusted users only, since exploitation requires interaction by users with Contributor or Developer privileges.

Implement security best practices such as input validation, output encoding, and monitoring for suspicious activity to reduce the risk of exploitation.

Consider enabling auto-updates for plugins if supported, to ensure timely application of security patches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart