CVE-2026-2512
Description
The Code Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom field meta values in all versions up to, and including, 2.5.1. This is due to the plugin's sanitization function sec_check_post_fields() only running on the save_post hook, while WordPress allows custom fields to be added via the wp_ajax_add_meta AJAX endpoint without triggering save_post. The ce_filter() function then outputs these unsanitized meta values directly into page content without escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected products
1- Range: <=2.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/browser/simple-embed-code/trunk/includes/add-embeds.phpnvd
- plugins.trac.wordpress.org/browser/simple-embed-code/trunk/includes/add-embeds.phpnvd
- plugins.trac.wordpress.org/browser/simple-embed-code/trunk/includes/secure.phpnvd
- plugins.trac.wordpress.org/changeset/3482994/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/375ed04b-a3cb-4e60-83c8-18bff583aaf4nvd
News mentions
0No linked articles in our index yet.