CVE-2026-1263
Stored XSS in Webling WordPress Plugin Allows Admin Script Injection
Publication date: 2026-04-10
Last updated on: 2026-04-10
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| webling | webling | to 3.9.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Webling plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in all versions up to and including 3.9.0. This vulnerability arises because the plugin does not properly sanitize input, escape output, or check user capabilities in certain functions ('webling_admin_save_form' and 'webling_admin_save_memberlist').
As a result, authenticated users with Subscriber-level access or higher can inject malicious web scripts into Webling forms and memberlists. These scripts execute whenever an administrator views the affected form or memberlist in the WordPress admin area.
How can this vulnerability impact me? :
This vulnerability allows attackers with low-level authenticated access to inject malicious scripts that execute in the context of an administrator's browser. This can lead to unauthorized actions such as stealing administrator credentials, hijacking sessions, or performing administrative functions without permission.
Because the attack requires only Subscriber-level access, it lowers the barrier for exploitation and can compromise the security and integrity of the WordPress site.