Description
The Percent to Infograph plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `percent_to_graph` shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-02-14
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Apply Patch
AI Analysis

Impact

The Percent to Infograph WordPress plugin allows an attacker to insert arbitrary JavaScript into the percent_to_graph shortcode via insufficient input sanitization and output escaping. The malicious code is stored in the database and executed whenever a user views the affected page, enabling the attacker to run scripts in the victim’s browser. This flaw represents an input‑validation weakness (CWE‑79) that can compromise the integrity and confidentiality of the site’s data.

Affected Systems

All instances of cutesalah’s Percent to Infograph plugin for WordPress that are at or below version 1.0. The plugin is hosted in the WordPress plugin repository and could be present on any WordPress installation that uses it.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity. The EPSS score is reported as less than 1%, suggesting that exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user with contributor-level access or higher, who can embed the malicious shortcode during content creation. Once stored, the code executes in the browsers of all users who view the page, creating a risk to institutional confidentiality and integrity.

Generated by OpenCVE AI on April 15, 2026 at 20:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a fixed version of the Percent to Infograph plugin if one is available; if not, uninstall the plugin.
  • Prevent contributors or higher‑privileged users from inserting shortcode attributes by revoking these capabilities or restricting role permissions for the plugin.
  • Deploy a content‑security policy that blocks inline scripts on the site, and/or use a web application firewall or sanitization plugin to filter shortcode output.

Generated by OpenCVE AI on April 15, 2026 at 20:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Cutesalah
Cutesalah percent To Infograph
Wordpress
Wordpress wordpress
Vendors & Products Cutesalah
Cutesalah percent To Infograph
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 06:45:00 +0000

Type Values Removed Values Added
Description The Percent to Infograph plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `percent_to_graph` shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Percent to Infograph <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Cutesalah Percent To Infograph
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:33.737Z

Reserved: 2026-02-04T21:24:46.740Z

Link: CVE-2026-1939

cve-icon Vulnrichment

Updated: 2026-02-18T20:14:01.552Z

cve-icon NVD

Status : Deferred

Published: 2026-02-14T07:16:11.977

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1939

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:45:06Z

Weaknesses