CVE-2026-6549
Description
The Logo Manager For Enamad plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' attribute of the vc_enamad_namad, vc_enamad_shamed, and vc_enamad_custom shortcodes in all versions up to, and including, 0.7.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Logo Manager For Enamad WordPress plugin (≤0.7.4) suffers from stored XSS via shortcode attributes, allowing contributor-level attackers to inject arbitrary scripts.
Vulnerability
Overview The Logo Manager For Enamad plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in all versions up to and including 0.7.4. The flaw resides in the vc_enamad_namad, vc_enamad_shamed, and vc_enamad_custom shortcodes, where the 'title' attribute is not properly sanitized or escaped before being stored and later rendered. This insufficient input validation allows malicious HTML or JavaScript to be embedded in page content [1].
Exploitation
Conditions An attacker must have at least contributor-level access to the WordPress site to exploit this vulnerability. By crafting a shortcode with a malicious 'title' attribute, the attacker can inject arbitrary web scripts. The injected script will execute whenever any user—including administrators or visitors—accesses the affected page. No additional privileges or network position are required beyond the contributor role [1].
Impact
Successful exploitation enables the attacker to perform actions such as stealing session cookies, redirecting users to malicious sites, defacing pages, or performing other client-side attacks. Because the XSS is stored, the payload persists across sessions and can affect multiple users without further interaction from the attacker [1].
Mitigation
Status The plugin has been closed as of May 14, 2026, pending a full review, and is no longer available for download from the WordPress plugin repository. Users are advised to remove the plugin from their installations or replace it with an alternative solution. No patched version has been released [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=0.7.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.trac.wordpress.org/browser/logo-manager-for-enamad/tags/0.7.4/widgets.phpnvd
- plugins.trac.wordpress.org/browser/logo-manager-for-enamad/trunk/widgets.phpnvd
- wordpress.org/plugins/logo-manager-for-enamadnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/ed6d1167-c89d-4c97-9446-b968df945e6cnvd
News mentions
0No linked articles in our index yet.