Vulnerability Description
The Name Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via double HTML-entity encoding in all versions up to, and including, 1.32.0. This is due to the plugin's sanitization function calling `html_entity_decode()` before `wp_kses()`, and then calling `html_entity_decode()` again on output. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page via the 'name_directory_name' and 'name_directory_description' parameters in the public submission form granted they can trick the site administrator into approving their submission or auto-publish is enabled.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/name-directory/tags/1.31.0/helpers.ph
- https://plugins.trac.wordpress.org/browser/name-directory/tags/1.31.0/shortcode.
- https://plugins.trac.wordpress.org/browser/name-directory/tags/1.31.0/shortcode.
- https://plugins.trac.wordpress.org/changeset/3455023/name-directory/trunk?contex
- https://www.wordfence.com/threat-intel/vulnerabilities/id/29d13457-ac60-4e3d-9d8
FAQ
What is CVE-2026-1866?
CVE-2026-1866 is a vulnerability with a CVSS score of 7.2 (HIGH). The Name Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via double HTML-entity encoding in all versions up to, and including, 1.32.0. This is due to the plugin's sanitizat...
How severe is CVE-2026-1866?
CVE-2026-1866 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1866?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.