Description
The Premmerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'premmerce_wizard_actions' AJAX endpoint in all versions up to, and including, 1.3.20. This is due to missing capability checks and insufficient input sanitization and output escaping on the `state` parameter. This makes it possible for authenticated attackers, with subscriber level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page (the Premmerce Wizard admin page).
Published: 2026-02-07
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Immediate Patch
AI Analysis

Impact

The Premmerce plugin for WordPress contains a stored XSS vulnerability triggered through the premmerce_wizard_actions AJAX endpoint. The flaw originates from a lack of capability checks and insufficient input sanitization and output escaping on the state parameter. Authenticated users with subscriber level or higher privileges can inject arbitrary scripts that are persisted on the Premmerce Wizard admin page; any administrator who visits the page will have the malicious code executed.

Affected Systems

All ranks of the Premmerce plugin up to and including version 1.3.20 are affected. The issue resides in the admin wizard component of the premmerce:Premmerce product for WordPress. Sites that host this plugin and allow subscriber‑level or higher users to access the wizard are impacted. Updating to a later release that removes the vulnerable endpoint eliminates the flaw.

Risk and Exploitability

The CVSS base score of 6.4 denotes moderate severity, while the EPSS score of less than 1% indicates a low likelihood of exploitation in recent observations. The vulnerability is not yet listed in CISA’s KEV catalog. Exploitation requires the attacker to be a logged‑in user with at least subscriber privileges and to interact with the wizard page; it does not grant remote code execution or privilege escalation beyond that role. Consequently, the risk is moderate but limited to sites that keep the legacy plugin and expose the wizard to non‑administrator users.

Generated by OpenCVE AI on April 15, 2026 at 21:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Premmerce plugin to the latest available version (≥1.3.21) to remove the vulnerable endpoint.
  • If an update cannot be applied immediately, disable the premmerce_wizard_actions AJAX endpoint for non‑administrator roles by adding a capability check or removing the action within the plugin’s code.
  • Implement a site‑wide XSS protection layer, such as a security plugin that enforces output escaping or adds content filtering, to mitigate stored XSS in other parts of the site.

Generated by OpenCVE AI on April 15, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
References

Thu, 12 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Premmerce
Premmerce premmerce
Wordpress
Wordpress wordpress
Vendors & Products Premmerce
Premmerce premmerce
Wordpress
Wordpress wordpress

Sat, 07 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Premmerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'premmerce_wizard_actions' AJAX endpoint in all versions up to, and including, 1.3.20. This is due to missing capability checks and insufficient input sanitization and output escaping on the `state` parameter. This makes it possible for authenticated attackers, with subscriber level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page (the Premmerce Wizard admin page).
Title Premmerce <= 1.3.20 - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'premmerce_wizard_actions' AJAX Endpoint
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Premmerce Premmerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:48.770Z

Reserved: 2026-01-01T20:56:47.477Z

Link: CVE-2026-0555

cve-icon Vulnrichment

Updated: 2026-02-11T15:37:24.758Z

cve-icon NVD

Status : Deferred

Published: 2026-02-07T09:15:59.733

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0555

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:30:13Z

Weaknesses