CVE-2026-6704
Description
The Blog Settings plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.0. This is due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in Blog Settings plugin for WordPress via the 'page' parameter allows unauthenticated attackers to inject arbitrary scripts.
The Blog Settings plugin for WordPress, in all versions up to and including 1.0, is vulnerable to Reflected Cross-Site Scripting (XSS). The vulnerability exists because the plugin fails to properly sanitize user input and escape output when handling the 'page' parameter. This insufficient validation allows an attacker to inject arbitrary web scripts into the page that will be reflected back to the user.
To exploit this vulnerability, an unauthenticated attacker must trick a user into clicking a crafted link. The attacker does not need any special network position or authentication; the attack is performed remotely by sending a malicious URL to the victim. The injected script executes in the context of the victim's browser session on the affected WordPress site.
Successful exploitation enables the attacker to execute arbitrary JavaScript in the victim's browser. This can lead to session hijacking, defacement of the site, or redirection to malicious sites. The impact is limited by the need for user interaction, but the attack surface is broad because no prior authentication is required.
The plugin has been closed as of April 29, 2026, pending a full review [1]. Users are advised to remove or replace the plugin immediately, as no patched version is available. No workaround has been provided, and the vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <= 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (May 4, 2026 to May 10, 2026)Wordfence Blog · May 14, 2026