CVE-2026-28072
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixFort pixfort Core pixfort-core allows Reflected XSS.This issue affects pixfort Core: from n/a through <= 3.2.22.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in pixfort Core plugin (≤3.2.22) allows attackers to inject malicious scripts via unneutralized input, exploited when privileged users click crafted links.
Vulnerability
Overview The pixfort Core WordPress plugin (versions through 3.2.22) suffers from a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. The flaw lies in the plugin's failure to sanitize or escape parameters before rendering them in HTTP responses, enabling the injection of arbitrary HTML and JavaScript.
Exploitation
Requirements Exploitation requires a user with certain privileges (e.g., author or higher) to interact with a crafted link or submit a malicious form [1]. The attacker does not need authentication to deliver the payload, but the victim must perform an action such as clicking a URL or visiting a specially prepared page. The reflected nature means the payload is immediately executed in the victim's browser session.
Impact
Assessment Successful exploitation allows an attacker to inject malicious scripts, resulting in actions like redirecting visitors to attacker-controlled sites, displaying unauthorized advertisements, or delivering other HTML payloads [1]. Given the moderate CVSS score of 7.1 and the likelihood of inclusion in mass-exploit campaigns, this vulnerability poses a tangible risk to WordPress sites running the affected plugin.
Mitigation
Status A patched version, 3.2.26, has been released to resolve the issue [1]. Users are strongly advised to update immediately. For those unable to update, Patchstack provides a virtual mitigation rule that blocks exploitation attempts until the plugin is updated [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=3.2.22
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.