Description
The Tour & Activity Operator Plugin for TourCMS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'target' parameter of the tourcms_doc_link shortcode in all versions up to, and including, 1.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-03-21
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that allows authenticated contributors to inject arbitrary scripts into web pages
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from the Tour & Activity Operator Plugin for TourCMS, a WordPress plugin, where the 'target' attribute of the tourcms_doc_link shortcode is insufficiently sanitized and escaped. When an authenticated user with Contributor level or higher supplies malicious input in this attribute, the data is stored and rendered in future page views, enabling the attacker to inject and execute arbitrary JavaScript code on browsers that load those pages. This can lead to phishing, theft of sensitive information, or manipulation of page content. The weakness is identified as CWE‑79, causing a significant impact on confidentiality and integrity of the site contents for all users who view the affected pages.

Affected Systems

The affected product is the Tour & Activity Operator Plugin for TourCMS, version 1.7.0 and all earlier releases. The plugin operates within WordPress installations, and the vulnerability exists in the shortcode handling logic used by site administrators and contributors to embed tour information links.

Risk and Exploitability

The CVSS score of 6.4 reflects a moderate severity with potential for client‑side impact. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. Because the exploit requires authentication at the Contributor level or higher, it is not publicly exploitable by unauthenticated users, but internal or compromised accounts can trigger the attack path by inserting malicious code into the shortcode via the admin or content editor interfaces.

Generated by OpenCVE AI on March 21, 2026 at 06:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Tour & Activity Operator Plugin to a version newer than 1.7.0 that addresses the shortcode sanitization issue.
  • Verify that future versions correctly escape or whitelist the 'target' attribute and perform input validation before storage.
  • If an update is not immediately possible, restrict Contributor or higher role permissions on shortcode editing, or remove the affected shortcode from public content until a patch is applied.

Generated by OpenCVE AI on March 21, 2026 at 06:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tourcms
Tourcms tour & Activity Operator Plugin For Tourcms
Wordpress
Wordpress wordpress
Vendors & Products Tourcms
Tourcms tour & Activity Operator Plugin For Tourcms
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The Tour & Activity Operator Plugin for TourCMS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'target' parameter of the tourcms_doc_link shortcode in all versions up to, and including, 1.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Tour & Activity Operator Plugin for TourCMS <= 1.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Tourcms Tour & Activity Operator Plugin For Tourcms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:47.793Z

Reserved: 2026-02-03T13:50:17.720Z

Link: CVE-2026-1806

cve-icon Vulnrichment

Updated: 2026-03-24T13:48:29.844Z

cve-icon NVD

Status : Deferred

Published: 2026-03-21T04:16:54.710

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-1806

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:12Z

Weaknesses