VYPR
Medium severity6.5NVD Advisory· Published Apr 15, 2026· Updated Apr 22, 2026

CVE-2026-40734

CVE-2026-40734

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zahlan Categories Images categories-images allows DOM-Based XSS.This issue affects Categories Images: from n/a through <= 3.3.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

DOM-based Cross-Site Scripting (XSS) in the WordPress Categories Images plugin up to 3.3.1 allows attackers with contributor-level access to inject malicious scripts via improperly neutralized input.

The Categories Images plugin for WordPress (versions up to and including 3.3.1) contains a DOM-based Cross-Site Scripting (XSS) vulnerability. The root cause is improper neutralization of user-supplied input during web page generation, specifically within the plugin's handling of image category data. This flaw enables an attacker to inject arbitrary JavaScript or HTML into the page's DOM, which then executes in the context of the victim's browser [1].

Exploitation requires a privileged user (such as a contributor or higher) to perform an action like clicking a crafted link or visiting a specially prepared page. The attacker does not need direct access to the server; instead, they rely on social engineering to trick an authenticated user into triggering the payload. The vulnerability is classified as DOM-based, meaning the malicious script is executed client-side after the page loads, bypassing server-side filters [1].

Successful exploitation allows the attacker to execute arbitrary scripts in the browser of any visitor to the affected site. This can lead to session hijacking, defacement, redirection to malicious sites, or injection of advertisements and other HTML payloads. The CVSS v3 score of 6.5 (Medium) reflects the need for user interaction and the potential for significant impact on confidentiality and integrity [1].

The vendor has released version 3.3.2, which resolves the vulnerability. Users are strongly advised to update immediately. For those unable to update, Patchstack users can enable auto-updates for vulnerable plugins. While the advisory notes a low severity impact and low likelihood of exploitation, the vulnerability is known to be used in mass-exploit campaigns targeting thousands of websites [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.