CVE-2026-7209
Description
The Simple Link Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's qcopd-directory shortcode in all versions up to, and including, 8.9.2. This is due to insufficient input sanitization and output escaping on user supplied attributes such as title_font_size. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Simple Link Directory plugin ≤8.9.2 via insufficient sanitization of shortcode attributes, allowing contributor+ users to inject arbitrary scripts.
Vulnerability
Overview The Simple Link Directory plugin for WordPress, up to and including version 8.9.2, contains a Stored Cross-Site Scripting (XSS) vulnerability in its qcopd-directory shortcode. The root cause is insufficient input sanitization and output escaping on user-supplied attributes such as title_font_size. This flaw allows authenticated attackers to inject arbitrary web scripts that are stored on the server and executed when other users access the affected page [1].
Exploitation
Prerequisites Exploitation requires an authenticated user with at least contributor-level access to the WordPress site. The attacker can craft a post or page containing the vulnerable shortcode with malicious payloads in attributes like title_font_size. No additional network position or special privileges beyond contributor are needed, as the shortcode is available to any user who can create content [1].
Impact
Successful exploitation enables the attacker to inject arbitrary JavaScript or HTML into the page. This script executes in the context of any visitor who views the compromised page, potentially leading to session hijacking, defacement, or theft of sensitive information. The stored nature of the XSS means the payload persists until the malicious content is removed [1].
Mitigation
As of the publication date, the vulnerability affects all versions up to 8.9.2. Users are advised to update to a patched version if available, or to restrict contributor-level access and carefully review shortcode attributes in user-generated content. No workaround is mentioned in the reference [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=8.9.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/simple-link-directory/tags/8.9.2/qc-op-directory-shortcodes.phpnvd
- plugins.trac.wordpress.org/browser/simple-link-directory/tags/8.9.2/templates/style-1/template.phpnvd
- plugins.trac.wordpress.org/browser/simple-link-directory/tags/8.9.4/qc-op-directory-shortcodes.phpnvd
- plugins.trac.wordpress.org/browser/simple-link-directory/tags/8.9.4/qc-op-directory-shortcodes.phpnvd
- wordpress.org/plugins/simple-link-directorynvd
- www.wordfence.com/threat-intel/vulnerabilities/id/9a7ca5f6-89c0-49ce-9aef-2208365c6151nvd
News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 27, 2026 to May 3, 2026)Wordfence Blog · May 7, 2026