Description
The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_wp_attachment_image_alt’ post meta in all versions up to, and including, 0.13.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-02-03
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Menu Icons by ThemeIsle plugin for WordPress has a stored cross‑site scripting vulnerability. The flaw lies in the handling of the ‘_wp_attachment_image_alt’ post meta field, where input is not properly sanitized or escaped. Attacks require authenticated access with Author‑level permissions or higher, and allow the attacker to inject arbitrary web scripts that will execute whenever a page containing that media metadata is loaded by a user.

Affected Systems

All WordPress installations that have the Menu Icons by ThemeIsle plugin version 0.13.20 or older, and where the plugin is active, are affected. Sites that allow Author or higher privileged users to upload media or modify the alt text field are at risk.

Risk and Exploitability

The CVSS score of 6.4 reflects a moderate severity for this stored XSS flaw. The EPSS score of less than 1% indicates a currently low probability of exploitation. Because the vulnerability requires authenticated access, the attack surface is limited to sites where an attacker can compromise or obtain a user account with Author or higher privileges. The flaw is not listed in the CISA KEV catalog, but any attacker who manages to exercise the required privileges can inject malicious JavaScript that will run in the browsers of visitors to the affected page.

Generated by OpenCVE AI on April 16, 2026 at 01:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Menu Icons by ThemeIsle plugin to the latest version released after 0.13.20, which removes the XSS vulnerability.
  • Restrict author‑level upload permissions to users who are trusted or to role‑based groups until the plugin is updated.
  • Implement a Content Security Policy that blocks inline scripts and restricts script sources to trusted domains to reduce the impact of any residual XSS for non‑patched installations.

Generated by OpenCVE AI on April 16, 2026 at 01:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Themeisle
Themeisle menu Icons
Wordpress
Wordpress wordpress
Vendors & Products Themeisle
Themeisle menu Icons
Wordpress
Wordpress wordpress

Tue, 03 Feb 2026 22:45:00 +0000

Type Values Removed Values Added
Description The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_wp_attachment_image_alt’ post meta in all versions up to, and including, 0.13.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Menu Icons by ThemeIsle <= 0.13.20 - Authenticated (Author+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Themeisle Menu Icons
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:55.712Z

Reserved: 2026-02-02T09:51:51.317Z

Link: CVE-2026-1755

cve-icon Vulnrichment

Updated: 2026-02-04T14:34:54.473Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T23:16:06.633

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1755

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:15:20Z

Weaknesses