VYPR
Medium severity6.4NVD Advisory· Published May 16, 2026· Updated May 18, 2026

CVE-2020-37235

CVE-2020-37235

Description

WordPress Theme Wibar 1.1.8 contains a stored cross-site scripting vulnerability in the Brand component that allows authenticated users to inject malicious scripts by manipulating the Logo URL parameter. Attackers with editor, administrator, contributor, or author privileges can inject base64-encoded script payloads through the ftc_brand_url input field to execute arbitrary JavaScript when users visit the brand page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

WordPress Theme Wibar 1.1.8 has a stored XSS in the Brand Logo URL parameter, allowing authenticated users to execute arbitrary JavaScript when others visit the brand page.

Vulnerability

WordPress Theme Wibar version 1.1.8 contains a stored cross-site scripting (XSS) vulnerability in the Brand component. The ftc_brand_url input field, used for the Logo URL parameter, does not properly sanitize user input. Authenticated users with editor, administrator, contributor, or author privileges can inject malicious scripts that are stored and executed when other users visit the brand page [1][2].

Exploitation

An attacker must have valid WordPress credentials with editor, administrator, contributor, or author roles. After logging in, the attacker navigates to the Brands section, adds a new brand, and in the Logo URL field enters a payload such as ">. Upon publishing, the injected script is stored. When any user visits the vulnerable brand's page, the script executes in the context of their browser [1].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the browsers of users who view the compromised brand page. This can lead to session hijacking, defacement, or theft of sensitive information. The attack is stored and persists until the malicious input is removed, affecting the confidentiality and integrity of the site for any visitor [1][2].

Mitigation

As of the available references, no official patch for Wibar 1.1.8 has been released. Users should consider upgrading to a newer version if available, or remove or restrict access to the Brand component for untrusted users. The theme may be end-of-life; consult the vendor for updates. The vulnerability is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog [1][2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.