VYPR
Medium severity6.4NVD Advisory· Published Mar 21, 2026· Updated Apr 22, 2026

CVE-2026-1093

CVE-2026-1093

Description

The WPFAQBlock– FAQ & Accordion Plugin For Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' parameter of the 'wpfaqblock' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WPFAQBlock plugin via unsanitized 'class' shortcode attribute allows Contributor+ users to inject arbitrary scripts.

Vulnerability

Overview

The WPFAQBlock plugin for WordPress, up to version 1.1, contains a stored cross-site scripting (XSS) vulnerability in the [wpfaqblock] shortcode. The class parameter is not properly sanitized or escaped before being output, allowing attackers to inject arbitrary HTML and JavaScript. This flaw stems from insufficient input validation on user-supplied attributes [1].

Exploitation

Prerequisites

An attacker must have at least Contributor-level access to the ability to create or edit posts containing the vulnerable shortcode. The class attribute is processed without adequate filtering, enabling the injection of malicious payloads. When a user visits a page containing the crafted shortcode, the injected script executes in their browser [1].

Impact

Successful exploitation leads to stored XSS, which can be used to steal session cookies, redirect users to malicious sites, or perform actions on behalf of the victim. Since the script executes in the context of the WordPress site, it can affect administrators and other users who view the compromised page [1].

Mitigation

The vendor released version 1.2.0 on March 24, 2026, which refines allowed HTML tags to improve security. Users are strongly advised to update to the latest version. No workaround is available for older versions [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.