Description
The Survey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2026-03-21
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (Admin)
Action: Apply Patch
AI Analysis

Impact

The Survey plugin for WordPress suffers from a stored cross‑site scripting flaw in drivers up to version 1.1, where input in the plugin’s admin settings is not properly sanitized or escaped. An attacker with administrator or higher privileges can embed arbitrary JavaScript into the plugin’s configuration, leading to script execution whenever any user views the edited page. This compromises both confidentiality and integrity of the affected site, as injected scripts can be used to steal session tokens, deface content, or perform other malicious actions.

Affected Systems

WordPress installations running the Survey plugin version 1.1 or any earlier release are impacted. The vulnerability is limited to multisite networks and applies only when the WordPress "unfiltered_html" content filter is disabled, which is a common skip‑filter configuration in many multisite setups.

Risk and Exploitability

With a CVSS score of 4.4 the flaw carries a moderate risk rating. The EPSS score is not provided, and the vulnerability is not catalogued in CISA’s KEV list, suggesting that exploitation is relatively uncommon. Attackers must first acquire administrator credentials on the site; once authorized, the flaw allows persistent script injection that will affect all visitors to pages using the compromised plugin settings.

Generated by OpenCVE AI on March 21, 2026 at 06:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Survey plugin to the latest stable release that removes the XSS defect
  • If an upgrade cannot be performed immediately, disable the Survey plugin until a patched version is available
  • On multisite networks, confirm that the "unfiltered_html" filter is enabled or adjust the configuration so that administrator‑only content is correctly sanitized before display

Generated by OpenCVE AI on March 21, 2026 at 06:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Seosbg
Seosbg survey
Wordpress
Wordpress wordpress
Vendors & Products Seosbg
Seosbg survey
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The Survey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title Survey <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via Plugin Settings
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Seosbg Survey
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:32.119Z

Reserved: 2026-01-20T18:55:11.385Z

Link: CVE-2026-1247

cve-icon Vulnrichment

Updated: 2026-03-23T16:35:02.278Z

cve-icon NVD

Status : Deferred

Published: 2026-03-21T04:16:51.877

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-1247

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:13Z

Weaknesses