CVE-2026-1923
Stored XSS in Social Rocket WordPress Plugin Allows Script Injection
Publication date: 2026-04-23
Last updated on: 2026-04-23
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| social_rocket | social_sharing_plugin | to 1.3.4.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated attackers with Subscriber-level access to inject arbitrary web scripts via Stored Cross-Site Scripting (XSS). This can lead to unauthorized access to user data or session hijacking, potentially compromising confidentiality and integrity of data.
Such security weaknesses can impact compliance with standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and attacks.
However, the provided information does not explicitly detail the direct compliance implications or specific regulatory impacts.
How can this vulnerability impact me? :
This vulnerability can allow authenticated attackers to execute arbitrary scripts in the context of the website.
- Compromise of user accounts or session hijacking.
- The injection of malicious content that could mislead or harm users.
- Potential defacement or unauthorized actions performed on behalf of users.
Can you explain this vulnerability to me?
The Social Rocket β Social Sharing Plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in the βidβ parameter in all versions up to and including 1.3.4.2.
This vulnerability exists because the plugin does not properly sanitize input or escape output, allowing attackers with Subscriber-level access or higher to inject malicious scripts.
These injected scripts execute whenever a user visits the affected page, potentially compromising user data or site integrity.