CVE-2026-1559
Stored XSS in Youzify WordPress Plugin Allows Script Injection
Publication date: 2026-04-18
Last updated on: 2026-04-18
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| youzify | youzify | to 1.3.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Youzify plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in the 'checkin_place_id' parameter in all versions up to and including 1.3.6. This vulnerability exists because the plugin does not properly sanitize input or escape output. As a result, authenticated users with Subscriber-level access or higher can inject malicious scripts that will execute whenever any user views the affected page.
How can this vulnerability impact me? :
This vulnerability allows attackers with low-level authenticated access to inject malicious scripts into the website. These scripts can execute in the context of other users visiting the site, potentially leading to theft of user credentials, session hijacking, defacement, or other malicious actions. The impact includes loss of confidentiality and integrity of user data, as well as potential damage to the website's reputation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in the Youzify plugin allows authenticated attackers to inject arbitrary scripts via Stored Cross-Site Scripting (XSS). This can lead to unauthorized access to user data or session hijacking, which may compromise the confidentiality and integrity of personal information.
Such security weaknesses can impact compliance with standards and regulations like GDPR and HIPAA, which require protection of personal data against unauthorized access and ensure data integrity and confidentiality.
However, specific impacts on compliance depend on the context of use, data handled, and mitigation measures implemented.