VYPR
Medium severity6.5NVD Advisory· Published Jan 23, 2026· Updated Apr 28, 2026

CVE-2026-24591

CVE-2026-24591

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yasir129 Turn Yoast SEO FAQ Block to Accordion faq-schema-block-to-accordion allows Stored XSS.This issue affects Turn Yoast SEO FAQ Block to Accordion: from n/a through <= 1.0.6.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in Turn Yoast SEO FAQ Block to Accordion plugin versions ≤1.0.6 allows attackers to inject malicious scripts via FAQ blocks.

The Turn Yoast SEO FAQ Block to Accordion plugin for WordPress versions 1.0.6 and below suffers from a stored cross-site scripting (XSS) vulnerability. The plugin fails to properly neutralize user input during web page generation, allowing unvalidated or unsanitized data to be stored and later executed in the browser of unsuspecting visitors [1].

Exploitation requires a user with at least contributor-level access to create or edit posts containing the FAQ block. By injecting malicious JavaScript into the block's content, an attacker can cause the script to be stored on the server and served to any user who views the affected page. No other privileged action is needed from the victim besides visiting the page [1].

Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to session hijacking, credential theft, forced redirects to malicious sites, or defacement of the website. The stored nature of the attack makes it particularly dangerous as it can affect multiple visitors without further interaction [1].

Users should immediately update the plugin to version 1.0.7 or later, which contains a fix from the vendor. If updating is not possible, consider disabling the plugin or implementing a web application firewall to block malicious payloads. Given the use of such vulnerabilities in mass-exploit campaigns, prompt action is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.