CVE-2022-50947
Received Received - Intake
Stored XSS in Testimonial Slider and Showcase WordPress Plugin

Publication date: 2026-05-10

Last updated on: 2026-05-10

Assigner: VulnCheck

Description
WordPress Plugin Testimonial Slider and Showcase 2.2.6 contains a stored cross-site scripting vulnerability that allows authenticated editors to inject malicious scripts by failing to sanitize the post_title parameter. Attackers with editor privileges can inject JavaScript payloads through the testimonial title field that execute in the browsers of users viewing the draft post, enabling cookie theft and session hijacking.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-10
Last Modified
2026-05-10
Generated
2026-05-10
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
testimonial_slider testimonial_slider 2.2.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2022-50947 is a stored cross-site scripting (XSS) vulnerability in the WordPress Plugin "Testimonial Slider and Showcase" version 2.2.6 and below.

The vulnerability occurs because the plugin fails to properly sanitize the post_title parameter, which is used in the testimonial title field.

This flaw allows authenticated users with editor privileges to inject malicious JavaScript code into the testimonial title.

When other users view the draft post containing the injected testimonial title, the malicious scripts execute in their browsers.

This can lead to attacks such as cookie theft and session hijacking.


How can this vulnerability impact me? :

If you use the vulnerable version of the Testimonial Slider and Showcase plugin, attackers with editor privileges can inject malicious scripts into testimonial titles.

These scripts execute in the browsers of users who view the affected draft posts, potentially allowing attackers to steal cookies and hijack user sessions.

This can compromise user accounts, lead to unauthorized access, and result in further exploitation of your website or users.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the WordPress site is running the Testimonial Slider and Showcase plugin version 2.2.6 or below, which contains the stored cross-site scripting flaw.

Detection involves verifying the plugin version and inspecting testimonial entries for malicious JavaScript payloads injected into the testimonial title field (post_title parameter).

Since the vulnerability requires authenticated editor privileges to inject scripts, monitoring editor activity and reviewing testimonial titles for suspicious script tags or unusual content can help identify exploitation attempts.

Specific commands to detect the vulnerability are not provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the Testimonial Slider and Showcase plugin to version 2.2.10 or later, where the stored cross-site scripting vulnerability has been fixed.

Additionally, restrict editor privileges to trusted users only, as the vulnerability requires authenticated editor access to exploit.

Review and sanitize existing testimonial titles to remove any injected malicious scripts.

Monitor user activity for suspicious behavior related to testimonial submissions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the stored cross-site scripting vulnerability in the WordPress Plugin Testimonial Slider and Showcase affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart