VYPR
Medium severity6.5NVD Advisory· Published Mar 25, 2026· Updated Apr 24, 2026

CVE-2026-32491

CVE-2026-32491

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jgwhite33 WP Review Slider wp-facebook-reviews allows Stored XSS.This issue affects WP Review Slider: from n/a through <= 13.9.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in WP Review Slider plugin allows authenticated attackers to inject malicious scripts into pages viewed by other users.

Vulnerability

Overview

The WP Review Slider plugin (wp-facebook-reviews) for WordPress is affected by a stored cross-site scripting (XSS) vulnerability, tracked as CVE-2026-32491. The issue arises from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be stored and later executed in the context of other users' browsers. This vulnerability affects all versions up to and including 13.9 [1].

Exploitation

Details

Exploitation requires an authenticated user with the appropriate privileges (e.g., contributor or higher) to inject a crafted payload. Successful execution also depends on user interaction, such as clicking a malicious link or visiting a specially crafted page. The vulnerability is considered moderately dangerous and is expected to be targeted in mass-exploit campaigns, as attackers often use such flaws to compromise thousands of websites regardless of their size or popularity [1].

Impact

An attacker exploiting this vulnerability can inject arbitrary HTML and JavaScript into the affected site. This could lead to redirects, unwanted advertisements, data theft, or other malicious actions when visitors access the compromised pages. The stored XSS nature means the payload persists and affects all subsequent visitors, amplifying the potential damage [1].

Mitigation

The vendor has released version 14.0, which resolves the vulnerability. Users are strongly advised to update immediately. For those unable to update, Patchstack provides a mitigation rule to block attacks until the patch is applied. Additionally, enabling auto-updates for vulnerable plugins is recommended [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

1