Description
The Reading progressbar WordPress plugin before 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Published: 2026-03-12
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Upgrade Plugin
AI Analysis

Impact

The Reading progressbar WordPress plugin prior to version 1.3.1 fails to sanitize and escape certain configuration inputs, allowing high‑privilege users such as administrators to inject arbitrary JavaScript that is subsequently stored in the database. This Stored Cross‑Site Scripting (CWE‑79) can be used to hijack user sessions, steal credentials or modify site content when the vulnerable settings are rendered, even if the unfiltered_html capability is disabled in a multisite environment.

Affected Systems

The vulnerability affects the Reading progressbar WordPress plugin before version 1.3.1. No specific vendor name is available; the affected product is identified as Unknown:Reading progressbar. Users running any installation of this plugin whose version is older than 1.3.1 are potentially impacted.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, and the EPSS score of less than 1% suggests a low likelihood that this vulnerability will be actively exploited in the wild. The exploit is application‑layer and requires an authenticated user with administrative privileges, which limits the attack surface. However, because the attack can lead to stored code execution in the browser, any compromised administrator could use the vulnerability to compromise other users or the site. The vulnerability is not listed in the CISA KEV catalog, indicating that there are no publicly documented exploits targeting this flaw as of the data available.

Generated by OpenCVE AI on March 18, 2026 at 14:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Reading progressbar plugin to version 1.3.1 or newer.
  • If upgrade is not possible, disable or uninstall the plugin to prevent stored XSS.
  • Restrict the use of high‑privilege roles to only those who absolutely need them.
  • Implement a Content Security Policy that disallows inline scripts to mitigate XSS impact.
  • Regularly review user activity logs for suspicious script injections.

Generated by OpenCVE AI on March 18, 2026 at 14:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Reading Progressbar
Reading Progressbar reading Progressbar
Wordpress
Wordpress wordpress
Vendors & Products Reading Progressbar
Reading Progressbar reading Progressbar
Wordpress
Wordpress wordpress

Thu, 12 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description The Reading progressbar WordPress plugin before 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title Reading progressbar < 1.3.1 - Admin+ Stored XSS
References

Subscriptions

Reading Progressbar Reading Progressbar
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-03-12T13:39:16.674Z

Reserved: 2026-02-18T14:09:37.224Z

Link: CVE-2026-2687

cve-icon Vulnrichment

Updated: 2026-03-12T13:39:07.091Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T06:16:30.613

Modified: 2026-03-12T21:07:53.427

Link: CVE-2026-2687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:35:59Z

Weaknesses