Description
The Schema Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `itemscope` shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-03-21
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting
Action: Patch
AI Analysis

Impact

The Schema Shortcode plugin for WordPress contains a flaw that allows authenticated users with contributor-level access and higher to store arbitrary JavaScript payloads via the plugin’s itemscope shortcode. The vulnerability arises from insufficient sanitization and escaping of user-supplied attributes, meaning that any injected script will execute in the browser of any visitor who loads a page containing the shortcode. Compromise of a user’s session, theft of credentials, and defacement of site content are all possible outcomes of this stored XSS flaw.

Affected Systems

This weakness affects all installations of the jeric_izon Schema Shortcode plugin, specifically versions up to and including 1.0. The plugin is used as a WordPress add‑on, so any WordPress site running the affected version is susceptible.

Risk and Exploitability

The CVSS score of 6.4 places the vulnerability in the moderate severity range. While no EPSS score is available, the lack of a KEV listing suggests that exploitation is not yet widespread, yet the bounds of the vulnerability are well understood. Attackers only need a contributor or higher role to inject malicious code, and the stored nature of the payload means the script will run for all site visitors until the code is removed. The combination of moderate severity, absence of a known public exploit, and the need for legitimate user credentials places this risk in a medium priority bracket for sites that allow contributor access.

Generated by OpenCVE AI on March 21, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Schema Shortcode to a version that eliminates the XSS flaw.
  • If an update is not available, uninstall or deactivate the plugin to remove the attack surface.
  • Verify that any remaining shortcodes are sanitized or removed before use.
  • Restrict contributor privileges or reassess role assignments to minimize the number of users who can inject content through the plugin.

Generated by OpenCVE AI on March 21, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Jeric Izon
Jeric Izon schema Shortcode
Wordpress
Wordpress wordpress
Vendors & Products Jeric Izon
Jeric Izon schema Shortcode
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The Schema Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `itemscope` shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Schema Shortcode <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Jeric Izon Schema Shortcode
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:50.872Z

Reserved: 2026-01-28T21:41:26.923Z

Link: CVE-2026-1575

cve-icon Vulnrichment

Updated: 2026-03-23T17:01:31.717Z

cve-icon NVD

Status : Deferred

Published: 2026-03-21T04:16:53.937

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-1575

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:41:44Z

Weaknesses