CVE-2026-8624
Reflected XSS in LJ Comments Import Reloaded WordPress Plugin
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lj_comments_import_reloaded | lj_comments_import_reloaded | to 0.97.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The LJ comments import: reloaded plugin for WordPress has a Reflected Cross-Site Scripting (XSS) vulnerability in all versions up to and including 0.97.1. This vulnerability occurs because the plugin does not properly sanitize or escape the PHP_SELF parameter, which includes attacker-controlled PATH_INFO appended to the script name. As a result, an attacker can inject arbitrary web scripts that execute when a user is tricked into performing an action like clicking a malicious link.
How can this vulnerability impact me? :
This vulnerability can allow unauthenticated attackers to execute arbitrary scripts in the context of the affected website. This can lead to theft of user credentials, session hijacking, defacement, or redirection to malicious sites. The attack requires tricking a user into clicking a crafted link, which then executes the injected script.