VYPR
High severity7.1NVD Advisory· Published Mar 5, 2026· Updated Apr 22, 2026

CVE-2026-28113

CVE-2026-28113

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in azzaroco Ultimate Learning Pro indeed-learning-pro allows Reflected XSS.This issue affects Ultimate Learning Pro: from n/a through <= 3.9.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS vulnerability in Ultimate Learning Pro plugin up to version 3.9.1 allows attackers to inject malicious scripts via improper input neutralization.

Vulnerability

Overview

The CVE-2026-28113 vulnerability affects the WordPress plugin Ultimate Learning Pro (indeed-learning-pro) versions up to and including 3.9.1. It is a reflected Cross-Site Scripting (XSS) issue caused by improper neutralization of user-supplied input during web page generation. This allows an attacker to inject arbitrary scripts or HTML into a page, which is then reflected back to the victim's browser [1].

Exploitation

Exploitation requires user interaction—a victim must click a crafted link, visit a specially prepared page, or submit a malicious form. The attacker does not need authentication to initiate the attack, but a privileged user (e.g., an administrator or editor) must be tricked into performing the action for the injected script to execute in the context of the WordPress admin or front-end session. This type of vulnerability is frequently used in mass-exploit campaigns targeting thousands of WordPress sites [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser. This can be used to steal session cookies, perform actions on behalf of the user, redirect visitors to malicious sites, display unwanted advertisements, or deface the website. The CVSS v3 score of 7.1 (High) reflects the potential for significant impact, though it requires user interaction and privileges [1].

Mitigation

As of the publication date (March 5, 2026), no official patch has been released; however, Patchstack has provided a virtual mitigation rule that blocks attacks until an update is available. Users are advised to immediately update the plugin once a patched version (>3.9.1) is released or to apply the virtual patch. Given the medium-long exploit likelihood and mass-exploit potential, this vulnerability should be prioritized [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.