VYPR
Medium severity6.1NVD Advisory· Published Mar 21, 2026· Updated Apr 22, 2026

CVE-2026-1647

CVE-2026-1647

Description

The Comment Genius plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the $_SERVER['PHP_SELF'] parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Comment Genius WordPress plugin via PHP_SELF parameter, enabling unauthenticated script injection.

Vulnerability

Overview The Comment Genius plugin for WordPress, in all versions up to and including 1.2.5, is vulnerable to Reflected Cross-Site Scripting through the $_SERVER['PHP_SELF'] parameter. The root cause is insufficient input sanitization and output escaping, allowing unsanitized user input to be reflected in server responses. This plugin has been closed as of March 5, 2026 due to a security issue [1].

Attack

Vector An unauthenticated attacker can exploit this vulnerability by crafting a malicious link that includes the PHP_SELF parameter with embedded JavaScript. Successful exploitation requires tricking a user into clicking the crafted link. The attack surface is broad because no authentication is needed, and the injected script executes within the context of the target user's session [1].

Impact

Successful exploitation allows an attacker to inject arbitrary web scripts into pages that execute when a victim performs a click action. The consequences can include session hijacking, credential theft, or defacement of the affected WordPress site. Because the vulnerability is reflected, the injected payload does not persist on the server [1].

Mitigation

The plugin has been closed and removed from the official WordPress repository. No patched version is available; users must uninstall and replace the plugin with an alternative. As of the publication date, there is no workaround for the vulnerability [1].

References
  1. Comment Genius

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.