CVE-2026-39712
Received Received - Intake
Cross-Site Scripting in tagDiv Composer Allows Code Injection

Publication date: 2026-04-08

Last updated on: 2026-04-29

Assigner: Patchstack

Description
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in tagDiv tagDiv Composer td-composer allows Code Injection.This issue affects tagDiv Composer: from n/a through <= 5.4.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tagdiv tagdiv_composer to 5.4.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-80 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-39712 is a vulnerability in the WordPress tagDiv Composer Plugin versions up to and including 5.4.3. It is a Content Injection vulnerability that allows unauthenticated attackers to inject arbitrary content into pages and posts on affected websites.

This vulnerability is caused by improper neutralization of script-related HTML tags, which is a form of basic Cross-Site Scripting (XSS). Attackers can exploit this to insert malicious content such as phishing pages.

The issue falls under the OWASP Top 10 category A3: Injection.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to inject arbitrary content into affected websites, potentially enabling malicious content such as phishing pages. This kind of content injection can lead to unauthorized data exposure or manipulation, which may impact compliance with standards like GDPR or HIPAA that require protection of personal and sensitive information.

However, the provided information does not explicitly describe the direct impact on compliance with specific regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability can allow attackers to inject malicious content into your website's pages and posts without authentication.

Such injected content could include phishing pages or other harmful scripts that may compromise your website visitors' security.

Although the CVSS severity score is 5.3, indicating a low priority threat with limited impact, it can still be exploited in mass campaigns targeting many websites.

Immediate mitigation involves updating the plugin to a non-vulnerable version once available or seeking assistance from hosting providers or web developers.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the tagDiv Composer plugin to a non-vulnerable version once it becomes available.

If an update is not yet available, seek assistance from your hosting provider or web developers to implement temporary protective measures.

Be aware that despite the vulnerability's low severity, it can be exploited in mass campaigns, so timely action is recommended.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability affects the WordPress tagDiv Composer Plugin versions up to and including 5.4.3, allowing unauthenticated attackers to inject arbitrary content into pages and posts.

To detect if your system is vulnerable, first verify the installed version of the tagDiv Composer plugin. You can do this by checking the plugin version in the WordPress admin dashboard or by running commands on the server.

  • Use WP-CLI to check the plugin version: wp plugin list | grep td-composer
  • Manually inspect the plugin directory for version information, e.g., cat wp-content/plugins/td-composer/readme.txt or plugin main file headers.

To detect exploitation attempts or injected content, you can search your website content or database for suspicious or unexpected shortcode injections or HTML/script tags.

  • Search for suspicious shortcodes or script tags in the WordPress database posts table: mysql -e "SELECT ID, post_content FROM wp_posts WHERE post_content LIKE '%[shortcode]%' OR post_content LIKE '%<script>%'"
  • Use web application firewall (WAF) or intrusion detection system (IDS) logs to identify unusual POST requests or content injections targeting the plugin.

Currently, no official patch is available, so monitoring plugin versions and content integrity is critical.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart