Description
The StyleBidet plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL path in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-02-14
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Patch Quickly
AI Analysis

Impact

An attacker can craft a URL that inserts arbitrary JavaScript into the page when the victim clicks the link. The vulnerability exists in all versions up to 1.0.0 of the StyleBidet WordPress plugin and is caused by insufficient input sanitization and output escaping. An unauthenticated user can exploit it by sending a malicious link to any visitor of the site, leading to potential theft of session cookies, defacement, or drive‑by compromise. The weakness is a classic reflected XSS (CWE‑79).

Affected Systems

The affected product is the WordPress plugin StyleBidet (indextwo:StyleBidet). All released versions up to and including 1.0.0 are impacted. No specific version numbers beyond the general upper bound are listed, so any deployment of a pre‑1.0.0 build must be considered vulnerable.

Risk and Exploitability

The CVSS base score of 6.1 indicates medium severity; the EPSS score below 1 % suggests that exploit probability is currently very low, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. The attack requires the victim to click a crafted link, a common social‑engineering vector. Once a victim executes the injected script in their browser, the attacker can execute arbitrary actions inside the context of the site’s domain. While the likelihood of widespread exploitation is low, the impact to a compromised user can be significant, especially on sites where users have administrative privileges.

Generated by OpenCVE AI on April 16, 2026 at 00:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the StyleBidet plugin to version 1.0.1 or later, if available; the vendor has fixed the input validation and output escaping issue.
  • If an immediate upgrade is not possible, permanently disable the plugin until a patch can be applied.
  • Implement a web‑application firewall or content‑security‑policy that blocks or sanitizes user‑supplied URLs to prevent script injection.

Generated by OpenCVE AI on April 16, 2026 at 00:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Indextwo
Indextwo stylebidet
Wordpress
Wordpress wordpress
Vendors & Products Indextwo
Indextwo stylebidet
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 06:45:00 +0000

Type Values Removed Values Added
Description The StyleBidet plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL path in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title StyleBidet <= 1.0.0 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Indextwo Stylebidet
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:32:47.680Z

Reserved: 2026-02-03T09:00:53.484Z

Link: CVE-2026-1796

cve-icon Vulnrichment

Updated: 2026-02-18T18:56:24.133Z

cve-icon NVD

Status : Deferred

Published: 2026-02-14T07:16:10.903

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1796

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:00:19Z

Weaknesses