CVE-2025-9126
Description
The Smart Table Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Smart Table Builder WordPress plugin via unsanitized 'id' parameter, affecting all versions up to 1.0.1.
The Smart Table Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in all versions up to and including 1.0.1. The vulnerability exists in the render_frontend function, where the 'id' parameter from shortcode attributes is used without proper sanitization or output escaping. The plugin directly outputs the user-supplied value into a `data-table-id attribute of a div element, allowing injection of arbitrary HTML and JavaScript [1][2].
An attacker must have at least Contributor-level access to the WordPress site to exploit this vulnerability. The attacker can inject malicious scripts via the 'id' parameter when creating or editing a table shortcode. The injected script will execute whenever any user (including administrators) visits the page containing the malicious shortcode. No additional authentication or network position is required beyond the contributor account [1].
Successful exploitation allows an authenticated attacker to execute arbitrary web scripts in the context of the victim's browser. This can lead to session hijacking, defacement, or theft of sensitive information such as cookies and authentication tokens. The impact is limited to stored XSS, meaning the malicious script persists on the page and affects all visitors [1].
The vulnerability has been patched in the commit c9ca2ad, which applies absint() to sanitize the ID and esc_attr() to escape the output in the HTML attribute [2]. Users are strongly advised to update to the latest version of the plugin as soon as a patched release becomes available. No workaround is provided, and the plugin may be removed if an update is not possible.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2v1.0.1+ 1 more
- (no CPE)range: v1.0.1
- (no CPE)range: <=1.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/DesignMike/smart-table-builder/commit/c9ca2adbb39fe4543e1eb56fc90cf1aeab558971nvd
- plugins.trac.wordpress.org/browser/smart-table-builder/trunk/includes/Frontend.phpnvd
- plugins.trac.wordpress.org/changeset/3351768/smart-table-builder/trunk/includes/Frontend.phpnvd
- wordpress.org/plugins/smart-table-builder/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/44e68e0c-1b21-411b-9ff7-6b6affc5988envd
News mentions
0No linked articles in our index yet.