CVE-2026-2687
Description
The Reading progressbar WordPress plugin before 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Reading progressbar plugin before 1.3.1 allows admin-level stored XSS via unsanitized settings, even when unfiltered_html is disallowed.
The Reading progressbar WordPress plugin prior to version 1.3.1 fails to sanitize and escape certain settings before saving them. This lack of output encoding allows an administrator to inject arbitrary JavaScript or HTML into the plugin's configuration, which is then stored and executed when the settings page is viewed or the progress bar is rendered on the front end. The vulnerability is particularly significant because it bypasses the unfiltered_html capability restriction, meaning it can be exploited in multisite installations where super admins typically have that capability but regular admins do not [1].
Exploitation
An attacker must have administrator-level access to the WordPress site. No other authentication or network position is required beyond the admin panel. The attacker can craft a malicious payload in one of the plugin's settings fields; because the plugin does not sanitize or escape the input, the payload is stored and later executed in the browser of any user who views the affected page. The proof of concept demonstrates that the attack is straightforward and does not require special privileges beyond admin [1].
Impact
Successful exploitation results in stored cross-site scripting (XSS). An attacker can execute arbitrary JavaScript in the context of the victim's session, potentially leading to session hijacking, defacement, or redirection to malicious sites. Since the attack is stored, it can affect multiple users, including other administrators and site visitors, without requiring social engineering beyond normal page visits.
Mitigation
The vulnerability is fixed in version 1.3.1 of the Reading progressbar plugin. Users should update immediately. No workarounds are documented; the only reliable mitigation is to apply the patch. The plugin's vendor has released the fix, and the vulnerability was publicly disclosed on 2026-02-19 [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <1.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.