Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yasir129 Turn Yoast SEO FAQ Block to Accordion faq-schema-block-to-accordion allows Stored XSS.This issue affects Turn Yoast SEO FAQ Block to Accordion: from n/a through <= 1.0.6.
Published: 2026-01-23
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting
Action: Patch
AI Analysis

Impact

This vulnerability is an instance of Improper Neutralization of Input During Web Page Generation, identified as CWE-79. The Turn Yoast SEO FAQ Block to Accordion plugin stores user‑supplied FAQ content without proper sanitization, allowing an attacker to inject malicious JavaScript that will run in the browsers of users who view the affected pages. A successful exploit could result in defacement, theft of session cookies, or arbitrary code execution within the victim’s browser context.

Affected Systems

Vulnerable versions of the Turn Yoast SEO FAQ Block to Accordion plugin, released by vendor yasir129, include all releases up to and including version 1.0.6. The plugin operates on WordPress sites; therefore any WordPress installation that has not upgraded beyond 1.0.6 is potentially exposed.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity, while the EPSS score of less than 1% points to a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the flaw is a stored XSS that can only be triggered by a user who can submit or edit FAQ entries. In practice this typically requires administrative or editor privileges within the WordPress dashboard. The attack vector therefore depends on the attacker’s ability to inject content into the plugin’s FAQ block, either through the normal creation interface or via an elevated account.

Generated by OpenCVE AI on April 28, 2026 at 22:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the plugin to the latest available version that addresses the XSS issue
  • If an upgrade is not immediately possible, deactivate or delete the plugin to prevent new content from being stored unverified
  • Review existing FAQ entries and remove or sanitize any that may contain malicious input

Generated by OpenCVE AI on April 28, 2026 at 22:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Yasir129
Yasir129 turn Yoast Seo Faq Block To Accordion
Vendors & Products Wordpress
Wordpress wordpress
Yasir129
Yasir129 turn Yoast Seo Faq Block To Accordion

Fri, 23 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yasir129 Turn Yoast SEO FAQ Block to Accordion faq-schema-block-to-accordion allows Stored XSS.This issue affects Turn Yoast SEO FAQ Block to Accordion: from n/a through <= 1.0.6.
Title WordPress Turn Yoast SEO FAQ Block to Accordion plugin <= 1.0.6 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Wordpress Wordpress
Yasir129 Turn Yoast Seo Faq Block To Accordion
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:49.787Z

Reserved: 2026-01-23T12:32:12.342Z

Link: CVE-2026-24591

cve-icon Vulnrichment

Updated: 2026-01-23T20:50:19.762Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:17.097

Modified: 2026-04-28T15:16:17.470

Link: CVE-2026-24591

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T22:30:41Z

Weaknesses