Description
The Canto Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'fx' shortcode attribute in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-01-24
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Canto Testimonials plugin for WordPress is vulnerable to Stored Cross‑Site Scripting via the 'fx' shortcode attribute. The vulnerability stems from insufficient input sanitization and missing output escaping when user‑supplied attributes are processed. An attacker who can authenticate with a Contributor role or higher can inject arbitrary JavaScript into pages that use the testimonials shortcode. When a user visits the affected page, the injected script runs in that user’s browser, potentially enabling defacement, cookie theft, or other malicious client‑side actions. The impact is limited to the authenticated author but can affect all visitors of any page containing the injected testimonial. The CVSS score of 6.4 indicates a medium severity risk.

Affected Systems

Vendors of note are Canto Themes. The product impacted is Canto Testimonials, specifically all releases up to and including version 1.0. No later versions are listed as affected, implying that a newer release may no longer contain the flaw. If an organization is running any of the affected releases, it must determine whether the application is accessible to contributors with write privileges.

Risk and Exploitability

The CVSS score of 6.4 combined with an EPSS score of less than one percent suggests that while the vulnerability is medium in severity, it is unlikely to be widely exploited at present. It is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is inferred: an authenticated contributor would edit or create a testimonial entry that includes the 'fx' shortcode containing malicious script. Once the entry is stored, any visitor to that page would execute the code. Defensive measures are therefore most relevant for sites allowing contributor editing of testimonials.

Generated by OpenCVE AI on April 15, 2026 at 19:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Canto Testimonials plugin to the latest available version, which has removed or properly sanitized the 'fx' shortcode attribute.
  • Remove or edit any existing testimonials that include the 'fx' attribute, or replace the attribute with a safe alternative before publishing the content.
  • Enforce stricter input validation for shortcode attributes in the plugin’s code, ensuring that all user‑supplied data is properly escaped before rendering.

Generated by OpenCVE AI on April 15, 2026 at 19:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Cantothemes
Cantothemes canto Testimonials
Wordpress
Wordpress wordpress
Vendors & Products Cantothemes
Cantothemes canto Testimonials
Wordpress
Wordpress wordpress

Sat, 24 Jan 2026 07:45:00 +0000

Type Values Removed Values Added
Description The Canto Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'fx' shortcode attribute in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Canto Testimonials <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'fx' Shortcode Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Cantothemes Canto Testimonials
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:59:51.530Z

Reserved: 2026-01-16T21:37:41.123Z

Link: CVE-2026-1095

cve-icon Vulnrichment

Updated: 2026-01-26T15:29:30.957Z

cve-icon NVD

Status : Deferred

Published: 2026-01-24T08:16:08.823

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1095

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:15:12Z

Weaknesses