Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in favethemes Houzez Theme - Functionality houzez-theme-functionality allows Stored XSS.This issue affects Houzez Theme - Functionality: from n/a through <= 4.2.6.
Published: 2026-01-22
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Plugin
AI Analysis

Impact

This vulnerability stems from improper neutralization of input that permits an attacker to embed malicious scripts in content stored by the Houzez Theme ‑ Functionality plugin. When a page containing the stored payload is viewed, arbitrary JavaScript runs in the victim’s browser context. This can lead to theft of session cookies, credential hijacking, defacement, or further malicious actions performed as the visitor. Based on the description, it is inferred that the attacker can create such a payload through the plugin’s content input fields that are rendered without proper escaping. The weakness corresponds to CWE‑79 – Cross‑Site Scripting.

Affected Systems

The flaw affects the favethemes Houzez Theme ‑ Functionality plugin in all versions up through and including 4.2.6. Any site running a vulnerable version without a patch is susceptible to stored XSS.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation typically requires the attacker to inject malicious content that is stored and later rendered by the plugin. This implicitly means the attacker must have write access to content or comment areas that the plugin does not sanitize. The likely attack vector is authenticated content creation or public input fields that the plugin does not cleanse. The risk is amplified if administrators grant posting permissions to untrusted users.

Generated by OpenCVE AI on April 18, 2026 at 03:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Houzez Theme ‑ Functionality plugin to the latest version available from the vendor.
  • If an upgrade cannot be performed immediately, restrict content editing privileges to trusted administrators and ensure that any user-supplied content is sanitized using WordPress safe output functions such as esc_html() or esc_js().
  • Implement a Web Application Firewall or security plugin that detects and blocks XSS payloads until a patch is applied.

Generated by OpenCVE AI on April 18, 2026 at 03:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 23 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Favethemes
Favethemes houzez
Wordpress
Wordpress wordpress
Vendors & Products Favethemes
Favethemes houzez
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in favethemes Houzez Theme - Functionality houzez-theme-functionality allows Stored XSS.This issue affects Houzez Theme - Functionality: from n/a through <= 4.2.6.
Title WordPress Houzez Theme - Functionality plugin <= 4.2.6 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Favethemes Houzez
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:07.518Z

Reserved: 2026-01-22T14:42:24.566Z

Link: CVE-2026-24355

cve-icon Vulnrichment

Updated: 2026-01-23T21:32:05.708Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:39.173

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24355

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:45:21Z

Weaknesses