<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Custom Twitter Feeds Plugin &lt;= 2.5.4 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/custom-twitter-feeds-plugin--2.5.4/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:51:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/custom-twitter-feeds-plugin--2.5.4/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-6177 - Custom Twitter Feeds WordPress Plugin Stored XSS</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-6177-wordpress-xss/</link><pubDate>Wed, 13 May 2026 15:51:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-6177-wordpress-xss/</guid><description>The Custom Twitter Feeds plugin for WordPress is vulnerable to stored cross-site scripting (XSS) in versions up to and including 2.5.4 due to insufficient output escaping, allowing unauthenticated attackers to inject arbitrary web scripts.</description><content:encoded><![CDATA[<p>The Custom Twitter Feeds plugin, a WordPress extension, contains a stored cross-site scripting (XSS) vulnerability. This flaw affects versions up to and including 2.5.4. The vulnerability stems from inadequate output sanitization within the <code>CTF_Display_Elements::get_post_text()</code> function, specifically when rendering cached tweet content. The <code>ctf_get_more_posts</code> AJAX action, accessible to unauthenticated users, directly outputs this cached tweet data using <code>nl2br()</code> without proper HTML escaping. Attackers can inject malicious HTML or JavaScript code into cached tweets (via direct tweets or other vulnerabilities) that will be executed when the <code>ctf_get_more_posts</code> endpoint is accessed. Exploitation allows unauthenticated remote attackers to execute arbitrary scripts in a victim&rsquo;s browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious tweet containing XSS payload (e.g., <code>&lt;script&gt;alert(&quot;XSS&quot;)&lt;/script&gt;</code>).</li>
<li>The WordPress site with the Custom Twitter Feeds plugin configured ingests and caches the malicious tweet.</li>
<li>The plugin stores the malicious tweet content in its cache, without sufficient sanitization.</li>
<li>An unauthenticated user visits a page that triggers the <code>ctf_get_more_posts</code> AJAX action, or an attacker directly requests the AJAX endpoint.</li>
<li>The plugin retrieves the cached tweet data containing the XSS payload.</li>
<li>The plugin&rsquo;s <code>CTF_Display_Elements::get_post_text()</code> function processes the cached tweet and uses <code>nl2br()</code> without proper escaping.</li>
<li>The unsanitized content is embedded into the page&rsquo;s HTML.</li>
<li>The victim&rsquo;s browser executes the injected JavaScript code, potentially leading to session hijacking, defacement, or redirection to malicious sites.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a user&rsquo;s browser. This can lead to various malicious outcomes, including session hijacking, defacement of the website, redirection to phishing sites, or further compromise of the affected WordPress site. The number of potentially affected websites is significant, given the popularity of the Custom Twitter Feeds plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Custom Twitter Feeds plugin to the latest version, which includes a patch for CVE-2026-6177.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts against the <code>ctf_get_more_posts</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests to the <code>ctf_get_more_posts</code> endpoint containing common XSS payloads.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>CVE-2026-6177</category></item></channel></rss>