Description
The Head Meta Data plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'head-meta-data' post meta field in all versions up to, and including, 20251118 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-01-20
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting exploitable by authenticated Contributor+ users
Action: Apply Patch
AI Analysis

Impact

The Head Meta Data plugin for WordPress contains a stored cross‑site scripting flaw in the ‘head‑meta‑data’ post meta field. Owing to missing input sanitization and output escaping, an authenticated user with contributor or higher privileges can inject arbitrary web scripts that are stored and then executed within the browsers of any visitor who loads a page that renders the affected meta field. The vulnerability thus permits the execution of malicious JavaScript in the context of site visitors.

Affected Systems

WordPress sites that have installed the Head Meta Data plugin from the specialk vendor and are running any version up to and including 20251118 are impacted. The flaw manifests whenever the plugin renders the stored post meta value on a page; thus any page that uses the plugin’s functionality can be used as an injection vector.

Risk and Exploitability

With a CVSS base score of 6.4, the vulnerability is considered moderate. The EPSS score indicates a very low likelihood of exploitation, and the vulnerability is not included in the CISA KEV catalog. Because the attack requires authorised contributor‑level or higher access, exploitation depends on the attacker first gaining such privileges within the site. Once injected, the malicious script runs in the visitor’s browser but no further outward impact is described in the public report.

Generated by OpenCVE AI on April 16, 2026 at 02:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Head Meta Data plugin to version 20260105 or newer, which implements proper input sanitization and output escaping for the post meta field.
  • Disable the plugin entirely if it is not required for site functionality.
  • If the plugin must remain active, restrict contributor‑level accounts from modifying the head‑meta‑data field and periodically audit the content for unexpected script injections.

Generated by OpenCVE AI on April 16, 2026 at 02:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Specialk
Specialk head Meta Data
Wordpress
Wordpress wordpress
Vendors & Products Specialk
Specialk head Meta Data
Wordpress
Wordpress wordpress

Tue, 20 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description The Head Meta Data plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'head-meta-data' post meta field in all versions up to, and including, 20251118 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Head Meta Data <= 20251118 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Meta
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Specialk Head Meta Data
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:10:04.176Z

Reserved: 2026-01-05T15:36:48.554Z

Link: CVE-2026-0608

cve-icon Vulnrichment

Updated: 2026-01-20T14:49:41.089Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T15:20:07.010

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0608

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:15:21Z

Weaknesses