CVE-2026-5717
Stored XSS in VI: Include Post By WordPress Plugin Allows Script Injection
Publication date: 2026-04-15
Last updated on: 2026-04-15
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vi_include_post_by | plugin | to 0.4.200706 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The VI: Include Post By plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in the 'class_container' attribute of the 'include-post-by-cat' shortcode. This vulnerability exists in all versions up to and including 0.4.200706 due to insufficient input sanitization and output escaping on user-supplied attributes.
Authenticated attackers with contributor-level access or higher can exploit this vulnerability to inject arbitrary web scripts into pages. These scripts will execute whenever any user accesses the injected page.
How can this vulnerability impact me? :
This vulnerability allows attackers with contributor-level access to inject malicious scripts into web pages. When other users visit these pages, the injected scripts execute, potentially leading to unauthorized actions such as stealing user credentials, session hijacking, or defacing the website.
Because the vulnerability requires only contributor-level access, it increases the risk from insiders or compromised accounts with limited privileges.