Description
The Rent Fetch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'keyword' parameter in all versions up to, and including, 0.32.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-02-18
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Apply Patch
AI Analysis

Impact

The Rent Fetch WordPress plugin is vulnerable to stored cross‑site scripting through the "keyword" parameter. The plugin fails to sanitize or escape user‑supplied input before persisting it to the database and rendering it on page loads. An unauthenticated attacker can inject arbitrary JavaScript that runs whenever a visitor views the affected page, enabling data theft, session hijacking, or the execution of malicious actions on the victim’s browser. This weakness is a classic CWE‑79 scenario: unsanitized input coupled with improper output encoding. The injected script executes in the context of the site, potentially affecting all users who view the modified page. Impact is significant for confidentiality, integrity, and availability of exposed data on the front side. The CVSS score of 7.2 indicates a high severity, although the EPSS score of less than 1% shows a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog.

Affected Systems

The affected product is the Rent Fetch plugin for WordPress, released by jonschr. All releases up to and including version 0.32.4 are vulnerable. The vulnerability affects any WordPress installation that uses these plugin versions and accepts the "keyword" query parameter. Upgrading to a later release (0.32.5 or newer) removes the flaw. Any site still running one of the affected versions is at risk. The CVE data does not specify operating system or PHP version dependencies, which suggests the issue resides solely in the plugin code. Risk and exploitability: With a moderate‑high CVSS, low EPSS, and no KEV listing, the threat is moderate but the potential for damage is high if an attacker can target the vulnerable pages. Because the vector is unauthenticated and based on a common HTTP GET parameter, an attacker can craft a link, share it, and lure users to trigger the malicious script. No special privileges are required beyond the ability to send a request containing the "keyword" value.

Risk and Exploitability

The CVSS score of 7.2 and the fact that the flaw allows arbitrary script execution when a user loads a page mean that the vulnerability can lead to full compromise of the front‑end session. The EPSS score of less than 1% indicates that current exploitation attempts are rare, possibly due to the need to find an active instance of the vulnerable plugin and to craft a suitable payload. Still, the lack of authentication barriers means any public or internal user can become victim. An attacker’s typical approach would involve creating a forbidden link containing a script‐laden keyword value, embedding it in a blog post, or sending it via email, where the victim’s browser would automatically execute the payload when the malicious page is rendered. Because the vulnerability is not cataloged in CISA’s KEV list, there is no documented exploitation campaign targeting it, but the risk remains for sites with the plugin installed and no mitigating controls in place.

Generated by OpenCVE AI on April 15, 2026 at 18:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Rent Fetch plugin to a version newer than 0.32.4 that removes the stored XSS flaw.
  • If an immediate upgrade is not possible, disable or remove any functionality that accepts the "keyword" query parameter, or manually enforce input sanitization for that field.
  • Deploy a web application firewall rule that detects and blocks script payloads targeting the keyword parameter.
  • Configure a strict Content Security Policy that disallows inline scripts and limits allowed script sources to trusted domains.

Generated by OpenCVE AI on April 15, 2026 at 18:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Jonschr
Jonschr rent Fetch
Wordpress
Wordpress wordpress
Vendors & Products Jonschr
Jonschr rent Fetch
Wordpress
Wordpress wordpress

Wed, 18 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Rent Fetch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'keyword' parameter in all versions up to, and including, 0.32.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Rent Fetch <= 0.32.4 - Unauthenticated Stored Cross-Site Scripting via 'keyword' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Jonschr Rent Fetch
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:48:20.061Z

Reserved: 2026-02-04T21:00:47.083Z

Link: CVE-2026-1931

cve-icon Vulnrichment

Updated: 2026-02-18T20:46:16.135Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T05:16:28.990

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1931

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:30:10Z

Weaknesses