Description
The Go Night Pro | WordPress Dark Mode Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'go-night-pro-shortcode' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on the user-supplied 'margin' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-03-21
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting (XSS)
Action: Patch
AI Analysis

Impact

The Go Night Pro WordPress plugin allows an authenticated contributor or higher to inject arbitrary JavaScript via the 'margin' attribute in its shortcode. Because the plugin does not properly sanitize or escape this input, the malicious script is stored as part of page content. When a visitor loads the affected page, the payload executes in their browser, enabling cookie theft, phishing, or other XSS attacks. This weakness corresponds to CWE‑79: Improper Neutralization of Input During Web Page Generation.

Affected Systems

WordPress sites running the Go Night Pro Dark Mode plugin version 1.1.0 or earlier are affected. Any site where contributors have permission to edit content and use the shortcode is vulnerable. Site administrators should check the installed plugin version and upgrade if it is 1.1.0 or lower.

Risk and Exploitability

With a CVSS score of 6.4 the vulnerability carries a medium‑to‑high severity. An attacker needs only contributor‑level access, a capability commonly granted in WordPress installations. Once a stored XSS payload is injected, it executes for every viewer of the page, potentially compromising user sessions and sensitive data. The EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, so the current exploit probability is uncertain, but the impact to exposed sites is significant.

Generated by OpenCVE AI on March 21, 2026 at 06:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Go Night Pro plugin to the latest available version (≥ 1.1.1).
  • If an upgrade is not yet available, remove the plugin or disable use of the 'go-night-pro-shortcode' on all pages.
  • Restrict contributor roles to only the minimum capabilities required for content creation, or revoke the ability to edit posts that include the shortcode.
  • Implement a web‑application firewall or content‑security‑policy that blocks unexpected JavaScript injection on the site.

Generated by OpenCVE AI on March 21, 2026 at 06:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Hrs2015
Hrs2015 go Night Pro | Wordpress Dark Mode Plugin
Wordpress
Wordpress wordpress
Vendors & Products Hrs2015
Hrs2015 go Night Pro | Wordpress Dark Mode Plugin
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The Go Night Pro | WordPress Dark Mode Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'go-night-pro-shortcode' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on the user-supplied 'margin' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Go Night Pro | WordPress Dark Mode Plugin <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'margin' Shortcode Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Hrs2015 Go Night Pro | Wordpress Dark Mode Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:50:44.095Z

Reserved: 2026-02-04T14:21:05.709Z

Link: CVE-2026-1886

cve-icon Vulnrichment

Updated: 2026-03-23T17:22:57.818Z

cve-icon NVD

Status : Deferred

Published: 2026-03-21T04:16:55.523

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-1886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:15Z

Weaknesses