<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lifepress — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/lifepress/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 09:17:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/lifepress/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-6690: LifePress WordPress Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-6690-lifepress-xss/</link><pubDate>Tue, 12 May 2026 09:17:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-6690-lifepress-xss/</guid><description>The LifePress plugin for WordPress is vulnerable to stored cross-site scripting (XSS) due to insufficient input sanitization and output escaping within the `lp_update_mds` AJAX action, allowing unauthenticated attackers to inject arbitrary web scripts via the 'n' parameter that execute when a user accesses the injected page; this affects versions up to and including 2.2.2.</description><content:encoded><![CDATA[<p>The LifePress plugin for WordPress contains a stored cross-site scripting (XSS) vulnerability that affects versions up to and including 2.2.2. The vulnerability resides in the <code>lp_update_mds</code> AJAX action, specifically the &rsquo;n&rsquo; parameter. The <code>wp_ajax_nopriv_lp_update_mds</code> action lacks both nonce verification and capability checks. Furthermore, the plugin exhibits insufficient input sanitization and output escaping when rendering the series name on the admin settings page. This allows unauthenticated attackers to inject arbitrary web scripts into pages. These scripts will then execute whenever a user accesses a page where the injected content is displayed. This can lead to account compromise, data theft, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP request targeting the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The attacker sets the <code>action</code> parameter to <code>lp_update_mds</code> within the HTTP request.</li>
<li>The attacker includes a crafted payload within the &rsquo;n&rsquo; parameter of the request, containing the malicious XSS script.</li>
<li>The server-side code, specifically the <code>wp_ajax_nopriv_lp_update_mds</code> function, processes the request without proper sanitization of the &rsquo;n&rsquo; parameter.</li>
<li>The unsanitized input from the &rsquo;n&rsquo; parameter is stored in the WordPress database.</li>
<li>An administrator or other authorized user accesses an admin settings page where the stored series name is displayed.</li>
<li>The malicious XSS payload is rendered in the user&rsquo;s browser due to the lack of output escaping.</li>
<li>The injected script executes within the user&rsquo;s browser session, potentially stealing cookies, redirecting the user, or performing other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to inject malicious JavaScript code into the WordPress site. This code can then be executed in the browsers of administrators or other users who access affected pages. This can lead to account compromise, defacement of the website, or redirection of users to phishing sites. Given the lack of authentication required to trigger this, a large number of WordPress sites using the LifePress plugin are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-6690 Exploitation Attempt via lp_update_mds AJAX Action&rdquo; to identify potential exploitation attempts targeting the vulnerable endpoint.</li>
<li>Inspect web server logs for POST requests to <code>wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>lp_update_mds</code> and containing suspicious characters in the <code>n</code> parameter.</li>
<li>Apply the available patch for the LifePress plugin, upgrading to a version greater than 2.2.2 to remediate CVE-2026-6690.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>cve-2026-6690</category><category>lifepress</category><category>stored-xss</category><category>plugin</category></item></channel></rss>