CVE-2026-6397
Description
The Sticky plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the cvmh-sticky shortcode readmoretext attribute in versions up to and including 2.5.6. This is due to insufficient input sanitization and output escaping in the cvmh_sticky_front_render() function — the readmoretext attribute value is passed through apply_filters() and directly concatenated into the HTML output without any escaping function such as esc_html(). This makes it possible for authenticated attackers with Contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a page containing the injected shortcode.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/browser/sticky/tags/2.5.6/includes/functions.phpnvd
- plugins.trac.wordpress.org/browser/sticky/tags/2.5.6/includes/shortcode.phpnvd
- plugins.trac.wordpress.org/browser/sticky/trunk/includes/functions.phpnvd
- plugins.trac.wordpress.org/browser/sticky/trunk/includes/shortcode.phpnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/135783c5-8175-4775-a013-f1e2bef04479nvd
News mentions
0No linked articles in our index yet.