VYPR
Medium severity6.4NVD Advisory· Published May 22, 2026

CVE-2026-9104

CVE-2026-9104

Description

The Draft List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Draft Post Title in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The unescaped injection path is triggered specifically when the viewing user lacks edit capabilities, meaning payloads embedded in draft post titles via attribute-breakout techniques execute for unauthenticated users and subscribers.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Draft List plugin for WordPress up to 2.6.3 stores unescaped draft post titles, allowing authenticated authors to inject stored XSS that executes for users without edit capabilities.

Vulnerability

The Draft List (simple-draft-list) plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the draft post title field. Affected versions are all up to and including 2.6.3 [1][2][3][4]. The vulnerability exists in the create-lists.php file where the $draft_title variable is output without proper sanitization or escaping when the template does not require content counting [1][2][3][4]. An attacker with author-level access or higher can craft a draft post title containing malicious JavaScript payloads, which are then stored and executed when other users view the draft list page.

Exploitation

An authenticated attacker with at least author-level privileges crafts a draft post whose title includes a malicious XSS payload, often using attribute-breakout techniques. When the plugin renders the draft list, the unescaped title is injected into the page HTML. The vulnerable code path is triggered specifically for viewing users who lack edit capabilities (e.g., unauthenticated users or subscribers) [1][2][3][4]. No additional user interaction is required beyond navigating to the page displaying the draft list.

Impact

Successful exploitation allows the attacker to inject arbitrary web scripts that execute in the browser of any user viewing the draft list page. This can lead to session hijacking, defacement, redirection to malicious sites, or theft of sensitive data. The attack achieves information disclosure at the level of the impacted user's session and privileges, potentially compromising the entire WordPress instance if an administrator views the page.

Mitigation

The vendor has released version 2.6.4 which addresses the issue [1][2][3]. Users should update the Draft List plugin to version 2.6.4 or later immediately. No workarounds are provided for older versions. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.