CVE-2026-4089
Stored XSS in Twittee Text Tweet WordPress Plugin Allows Script Injection
Publication date: 2026-04-22
Last updated on: 2026-04-22
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | twittee_text_tweet | to 1.0.8 (inc) |
| wordfence | twittee_text_tweet_plugin | to 1.0.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Twittee Text Tweet plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in all versions up to 1.0.8. This occurs because the plugin does not properly sanitize or escape user-supplied shortcode attributes before inserting them into HTML and JavaScript contexts.
Specifically, the 'id' shortcode attribute is inserted into an HTML id attribute without proper escaping, allowing attackers to break out of the attribute and inject malicious HTML event handlers. Other attributes like 'tweet', 'content', 'balloon', and 'theme' are injected into inline JavaScript without escaping, enabling script injection.
Authenticated users with Contributor-level access or higher can exploit this vulnerability to inject arbitrary web scripts that execute whenever a user views the affected page.
How can this vulnerability impact me? :
This vulnerability can allow attackers with Contributor-level access or above to inject malicious scripts into web pages. These scripts can execute in the browsers of users who visit the infected pages.
The impact includes potential theft of user credentials, session hijacking, defacement of the website, or redirection to malicious sites. Since the vulnerability is a Stored XSS, the malicious code persists on the site and affects all visitors to the compromised pages.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying the presence of the Twittee Text Tweet plugin for WordPress versions up to and including 1.0.8, which are vulnerable to Stored Cross-Site Scripting via the 'id' shortcode attribute.
Since the vulnerability is related to shortcode attributes being unsafely handled, you can scan your WordPress installation for the plugin version and look for usage of the 'id' shortcode attribute in posts or pages.
There are no specific commands provided in the available resources, but general detection steps include:
- Check the installed plugin version by running: wp plugin list | grep twittee_text_tweet
- Search the WordPress database for posts or pages containing the shortcode with the 'id' attribute, for example using a MySQL query: SELECT ID, post_content FROM wp_posts WHERE post_content LIKE '%[twittee_text_tweet id=%';
- Monitor HTTP requests and responses for injected scripts or unusual HTML attributes that could indicate exploitation.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Twittee Text Tweet plugin to a version that fixes the vulnerability if available.
If an update is not available, restrict Contributor-level and higher user permissions to trusted users only, as the vulnerability requires authenticated users with at least Contributor access to exploit.
Additionally, consider disabling or removing the plugin temporarily to prevent exploitation.
Implement Web Application Firewall (WAF) rules to detect and block attempts to inject malicious shortcode attributes.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated attackers with Contributor-level access and above to inject arbitrary web scripts into pages, which execute when accessed by users. This Stored Cross-Site Scripting (XSS) flaw can lead to unauthorized access to user data or session hijacking.
Such unauthorized script execution and potential data exposure can negatively impact compliance with standards and regulations like GDPR and HIPAA, which require protection of personal data and prevention of unauthorized access.
However, the provided information does not explicitly discuss compliance impacts or regulatory considerations.