CVE-2026-4089
Received Received - Intake
Stored XSS in Twittee Text Tweet WordPress Plugin Allows Script Injection

Publication date: 2026-04-22

Last updated on: 2026-04-22

Assigner: Wordfence

Description
The Twittee Text Tweet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' shortcode attribute in all versions up to and including 1.0.8. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes. The ttt_twittee_tweeter() function uses extract() to pull shortcode attributes into local variables and then directly concatenates them into HTML output without any escaping. Specifically, the $id parameter is inserted into an HTML id attribute context without esc_attr(), allowing an attacker to break out of the attribute and inject arbitrary HTML event handlers. Additionally, the $tweet, $content, $balloon, and $theme attributes are similarly injected into inline JavaScript without escaping (lines 87, 93, 101, 117). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wordfence twittee_text_tweet to 1.0.8 (inc)
wordfence twittee_text_tweet_plugin to 1.0.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Twittee Text Tweet plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in all versions up to 1.0.8. This occurs because the plugin does not properly sanitize or escape user-supplied shortcode attributes before inserting them into HTML and JavaScript contexts.

Specifically, the 'id' shortcode attribute is inserted into an HTML id attribute without proper escaping, allowing attackers to break out of the attribute and inject malicious HTML event handlers. Other attributes like 'tweet', 'content', 'balloon', and 'theme' are injected into inline JavaScript without escaping, enabling script injection.

Authenticated users with Contributor-level access or higher can exploit this vulnerability to inject arbitrary web scripts that execute whenever a user views the affected page.


How can this vulnerability impact me? :

This vulnerability can allow attackers with Contributor-level access or above to inject malicious scripts into web pages. These scripts can execute in the browsers of users who visit the infected pages.

The impact includes potential theft of user credentials, session hijacking, defacement of the website, or redirection to malicious sites. Since the vulnerability is a Stored XSS, the malicious code persists on the site and affects all visitors to the compromised pages.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying the presence of the Twittee Text Tweet plugin for WordPress versions up to and including 1.0.8, which are vulnerable to Stored Cross-Site Scripting via the 'id' shortcode attribute.

Since the vulnerability is related to shortcode attributes being unsafely handled, you can scan your WordPress installation for the plugin version and look for usage of the 'id' shortcode attribute in posts or pages.

There are no specific commands provided in the available resources, but general detection steps include:

  • Check the installed plugin version by running: wp plugin list | grep twittee_text_tweet
  • Search the WordPress database for posts or pages containing the shortcode with the 'id' attribute, for example using a MySQL query: SELECT ID, post_content FROM wp_posts WHERE post_content LIKE '%[twittee_text_tweet id=%';
  • Monitor HTTP requests and responses for injected scripts or unusual HTML attributes that could indicate exploitation.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Twittee Text Tweet plugin to a version that fixes the vulnerability if available.

If an update is not available, restrict Contributor-level and higher user permissions to trusted users only, as the vulnerability requires authenticated users with at least Contributor access to exploit.

Additionally, consider disabling or removing the plugin temporarily to prevent exploitation.

Implement Web Application Firewall (WAF) rules to detect and block attempts to inject malicious shortcode attributes.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated attackers with Contributor-level access and above to inject arbitrary web scripts into pages, which execute when accessed by users. This Stored Cross-Site Scripting (XSS) flaw can lead to unauthorized access to user data or session hijacking.

Such unauthorized script execution and potential data exposure can negatively impact compliance with standards and regulations like GDPR and HIPAA, which require protection of personal data and prevention of unauthorized access.

However, the provided information does not explicitly discuss compliance impacts or regulatory considerations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart