Vulnerability Description
The xmlrpc attacks blocker plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0, via the 'X-Forwarded-For' HTTP header. This is due to the plugin trusting and logging attacker-controlled IP header data and rendering debug log entries without output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the debug log page.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/xmlrpc-attacks-blocker/tags/1.0/plugi
- https://plugins.trac.wordpress.org/browser/xmlrpc-attacks-blocker/tags/1.0/plugi
- https://plugins.trac.wordpress.org/browser/xmlrpc-attacks-blocker/tags/1.0/plugi
- https://plugins.trac.wordpress.org/browser/xmlrpc-attacks-blocker/tags/1.0/plugi
- https://www.wordfence.com/threat-intel/vulnerabilities/id/059f0c64-efcc-4b79-81e
FAQ
What is CVE-2026-2502?
CVE-2026-2502 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The xmlrpc attacks blocker plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0, via the 'X-Forwarded-For' HTTP header. This is due to the plugin tru...
How severe is CVE-2026-2502?
CVE-2026-2502 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2502?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.