<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PixelYourSite — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/pixelyoursite/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 17:17:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/pixelyoursite/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-7613: Cost of Goods by PixelYourSite WordPress Plugin Stored XSS</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-7613-wordpress-xss/</link><pubDate>Wed, 20 May 2026 17:17:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-7613-wordpress-xss/</guid><description>The Cost of Goods by PixelYourSite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'csvdata[0][cost_of_goods_value]' parameter in versions up to, and including, 1.2.12 due to insufficient input sanitization and output escaping, allowing unauthenticated attackers to inject arbitrary web scripts that execute when a user accesses an injected page.</description><content:encoded><![CDATA[<p>CVE-2026-7613 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Cost of Goods by PixelYourSite plugin for WordPress. The vulnerability exists due to insufficient input sanitization and output escaping of the &lsquo;csvdata[0][cost_of_goods_value]&rsquo; parameter. Unauthenticated attackers can exploit this flaw to inject arbitrary web scripts into pages, which will then execute whenever a user accesses the affected page. The affected versions of the Cost of Goods by PixelYourSite plugin are up to and including 1.2.12. This vulnerability was reported by Wordfence on May 20, 2026. Successful exploitation could lead to account compromise, data theft, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP request targeting the WordPress site.</li>
<li>The request includes a payload containing a JavaScript injection within the <code>csvdata[0][cost_of_goods_value]</code> parameter.</li>
<li>The attacker sends the crafted POST request to a WordPress endpoint that processes the Cost of Goods plugin data.</li>
<li>The Cost of Goods plugin fails to properly sanitize or escape the injected JavaScript within the <code>csvdata[0][cost_of_goods_value]</code> parameter.</li>
<li>The malicious payload is stored in the WordPress database.</li>
<li>A user visits a page that displays the stored data from the Cost of Goods plugin.</li>
<li>The injected JavaScript code is executed within the user&rsquo;s browser, potentially performing actions such as stealing cookies or redirecting the user to a malicious website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability could allow an attacker to compromise WordPress administrator accounts, inject malicious content into the website, or redirect users to phishing sites. As an unauthenticated user can inject arbitrary scripts, the impact could be widespread if an administrator views the injected content. Compromise of the administrator account could lead to complete control over the WordPress website.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Cost of Goods by PixelYourSite plugin to a version greater than 1.2.12 to patch CVE-2026-7613.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2026-7613 Exploitation — Cost of Goods Plugin XSS</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement input validation and output encoding on all user-supplied data to prevent XSS vulnerabilities.</li>
<li>Monitor WordPress logs for suspicious activity related to the Cost of Goods plugin, such as unexpected modifications to plugin settings or data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>wordpress</category><category>CVE-2026-7613</category></item></channel></rss>