CVE-2026-40734
Received Received - Intake
DOM-Based XSS in Zahlan Categories Images

Publication date: 2026-04-15

Last updated on: 2026-04-16

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zahlan Categories Images categories-images allows DOM-Based XSS.This issue affects Categories Images: from n/a through <= 3.3.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-16
Generated
2026-05-07
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
zahlan categories_images to 3.3.1 (inc)
zahlan categories_images From 3.0.0 (inc) to 3.3.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

The primary immediate step to mitigate this vulnerability is to update the WordPress Categories Images Plugin to version 3.3.2 or later, where the issue has been patched.

Additionally, restricting user privileges to prevent untrusted users from having Contributor or Developer roles can reduce the risk of exploitation.

Using automated update tools or vulnerability mitigation services like Patchstack can help ensure rapid deployment of patches and reduce exposure.


Can you explain this vulnerability to me?

CVE-2026-40734 is a Cross Site Scripting (XSS) vulnerability found in the WordPress Categories Images Plugin versions up to and including 3.3.1.

This vulnerability allows attackers to inject malicious scriptsβ€”such as redirects, advertisements, or other HTML payloadsβ€”into websites, which execute when visitors access the compromised site.

The issue is classified under the OWASP Top 10 category A3: Injection and has a CVSS severity score of 6.5, indicating a moderate risk level.

Exploitation requires a user with at least Contributor or Developer privileges to perform an action like clicking a malicious link, visiting a crafted page, or submitting a form.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to inject and execute malicious scripts on your website.

  • Attackers can perform redirects to malicious sites.
  • Attackers can display unwanted advertisements.
  • Attackers can inject other harmful HTML payloads that execute when visitors access the site.

Although considered a moderate risk, it has been used in mass-exploit campaigns targeting many websites regardless of their traffic or popularity.

Exploitation requires a user with Contributor or Developer privileges to interact with malicious content.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves Cross Site Scripting (XSS) in the WordPress Categories Images Plugin up to version 3.3.1, allowing malicious script injection when users with Contributor or Developer privileges interact with crafted content.

Detection typically involves monitoring for unusual script execution or injected HTML payloads in web pages generated by the plugin. Since the vulnerability is DOM-based XSS, it may be detected by analyzing web traffic for suspicious scripts or by testing the plugin with crafted inputs.

Specific commands are not provided in the available resources. However, common approaches include using web vulnerability scanners that detect XSS, or manual testing by inputting typical XSS payloads into the plugin's input fields and observing if scripts execute.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the CVE-2026-40734 vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart