Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 10 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Usystemsgmbh
Usystemsgmbh webling Wordpress Wordpress wordpress |
|
| Vendors & Products |
Usystemsgmbh
Usystemsgmbh webling Wordpress Wordpress wordpress |
Fri, 10 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Webling plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.9.0 due to insufficient input sanitization, insufficient output escaping, and missing capabilities checks in the 'webling_admin_save_form' and 'webling_admin_save_memberlist' functions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject Webling forms and memberlists with arbitrary web scripts that will execute whenever an administrator views the related form or memberlist area of the WordPress admin. | |
| Title | Webling <= 3.9.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'title' Parameter | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-10T15:54:58.703Z
Reserved: 2026-01-20T21:18:05.973Z
Link: CVE-2026-1263
Updated: 2026-04-10T15:51:53.295Z
Status : Received
Published: 2026-04-10T02:16:02.083
Modified: 2026-04-10T02:16:02.083
Link: CVE-2026-1263
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:27:10Z