CVE-2026-24620
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PluginOps Landing Page Builder page-builder-add allows Stored XSS.This issue affects Landing Page Builder: from n/a through <= 1.5.3.4.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in PluginOps Landing Page Builder (≤1.5.3.4) allows attackers to inject malicious scripts via improper input neutralization.
Vulnerability
Overview
The Landing Page Builder plugin for WordPress (versions up to and including 1.5.3.4) contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. This flaw allows an authenticated attacker with sufficient-privilege user to inject arbitrary HTML and JavaScript code, including JavaScript, which is then stored and executed when other users visit the affected page.
Exploitation
Conditions
Exploitation requires a user with at least the role specified in the plugin's settings (typically an editor or administrator) to submit crafted input. The attacker does not need direct access to the server; they can deliver the payload through the plugin's interface. Successful exploitation also requires a privileged user to perform an action such as clicking a link or submitting a form, making it a stored XSS with user interaction [1].
Impact
An attacker can inject malicious scripts that execute in the context of any visitor's browser. This can lead to redirection to malicious sites, display of unauthorized advertisements, theft of session cookies, or other client-side attacks. The vulnerability is rated Medium (CVSS 5.9) and is known to be used in mass-exploit campaigns targeting thousands of WordPress sites [1].
Mitigation
The vendor has released version 1.5.3.5 which resolves the issue. Users are strongly advised to update immediately. Patchstack users can enable auto-updates for vulnerable plugins. If updating is not possible, consulting a hosting provider or web developer is recommended [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=1.5.3.4
- Range: <=1.5.3.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.