<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5425 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5425/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 04 Apr 2026 09:16:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5425/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Widgets for Social Photo Feed Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-xss/</link><pubDate>Sat, 04 Apr 2026 09:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-xss/</guid><description>The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'feed_data' parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute when a user accesses the injected page.</description><content:encoded><![CDATA[<p>The Widgets for Social Photo Feed plugin for WordPress, versions up to and including 1.7.9, contains a stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-5425). This vulnerability stems from insufficient input sanitization and output escaping of the &lsquo;feed_data&rsquo; parameter keys. An unauthenticated attacker can exploit this flaw by injecting malicious JavaScript code into the WordPress database. When a user visits a page containing a vulnerable widget, the injected script executes within their browser, potentially leading to session hijacking, account takeover, or other malicious activities. This vulnerability was reported by Wordfence and patched in version 1.8 of the plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The unauthenticated attacker identifies a WordPress site using a vulnerable version (&lt;= 1.7.9) of the Widgets for Social Photo Feed plugin.</li>
<li>The attacker crafts a malicious HTTP request targeting the plugin&rsquo;s functionality that handles the <code>feed_data</code> parameter. This request contains XSS payload within the parameter keys.</li>
<li>The WordPress server receives the crafted HTTP request. The vulnerable plugin processes the request without proper input sanitization or output escaping.</li>
<li>The malicious XSS payload is stored in the WordPress database, associated with the plugin&rsquo;s settings or data.</li>
<li>A legitimate user visits a page on the WordPress site where the affected widget is displayed.</li>
<li>The WordPress server retrieves the plugin data, including the stored XSS payload, from the database.</li>
<li>The server renders the page with the unsanitized XSS payload embedded within the HTML output.</li>
<li>The user&rsquo;s browser receives the HTML page containing the malicious script and executes it. This could lead to redirection, information theft, or further compromise of the user&rsquo;s session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in the context of a website user&rsquo;s browser. This can result in session hijacking, defacement of the website, redirection to malicious sites, or the theft of sensitive information. While the exact number of vulnerable installations is not available, the widespread use of WordPress plugins makes this a potentially significant threat, particularly for sites that do not promptly apply security updates.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Widgets for Social Photo Feed plugin to version 1.8 or later to patch CVE-2026-5425.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Social Photo Feed XSS Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement a web application firewall (WAF) rule to filter out requests containing potentially malicious JavaScript code in the <code>feed_data</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>cve-2026-5425</category><category>plugin</category></item></channel></rss>