The UsersWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 1.2.60. This is due to insufficient input sanitization of user-supplied URL fields and improper output escaping when rendering user profile data in badge widgets. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts that will execute whenever a user accesses a page containing the affected badge widget.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stiofansisland
Stiofansisland userswp – Front-end Login Form, User Registration, User Profile & Members Directory Plugin For Wp Wordpress Wordpress wordpress |
|
| Vendors & Products |
Stiofansisland
Stiofansisland userswp – Front-end Login Form, User Registration, User Profile & Members Directory Plugin For Wp Wordpress Wordpress wordpress |
Thu, 09 Apr 2026 04:30:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-09T03:25:58.117Z
Reserved: 2026-04-07T13:47:10.286Z
Link: CVE-2026-5742
No data.
Status : Received
Published: 2026-04-09T05:16:05.327
Modified: 2026-04-09T05:16:05.327
Link: CVE-2026-5742
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:25:03Z
Weaknesses