As part of my independent learning and hands-on security research, I analyzed WordPress plugins that allow users to submit posts from the front end. During this analysis, I discovered an unauthenticated stored cross-site scripting (XSS) vulnerability in the User Submitted Posts — Enable Users to Submit Posts from the Front End plugin, affecting versions ≤ 20251210.

The issue was responsibly disclosed through Wordfence and assigned CVE-2026–0800.

Proof of Concept (PoC)

Vulnerability Description

The plugin stores user-supplied input from a public submission form as post meta. This data is later rendered inside the WordPress admin post edit screen without proper sanitization or output escaping, allowing stored JavaScript execution.

Payload Used

"><script>alert('Vulnerable: Stored XSS by Bala');</script>

Steps to Reproduce

  1. Install and activate the User Submitted Posts plugin (version ≤ 20251210).
  2. Navigate to the public-facing post submission form.
  3. Fill in the required fields such as post title and content.
  4. Insert the payload into the Custom Field input (user-submitted-custom).
  5. Submit the post.
  6. Log in to WordPress as an Administrator.
  7. Navigate to Posts → All Posts.

Result

When the post edit page loads, the injected JavaScript executes automatically within the WordPress admin interface, confirming an unauthenticated stored XSS vulnerability.

References

Author Balamurugan R Independent Security Researcher