Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PenciDesign Penci Podcast penci-podcast allows DOM-Based XSS.This issue affects Penci Podcast: from n/a through <= 1.7.
Published: 2026-02-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site Scripting (DOM‑based XSS)
Action: Patch
AI Analysis

Impact

The vulnerability is an improper neutralization of input during web page generation, allowing an attacker to inject malicious scripts via DOM manipulation. This leads to cross‑site scripting that can execute arbitrary JavaScript when affected users view pages rendered by the plugin. The weakness is captured as CWE‑79. No details about remote code execution are provided; impact is restricted to compromise of local user session and potential data exfiltration or defacement. The flaw is limited to the Penci Podcast plugin version <=1.7, and it is a DOM‑based XSS rather than a server‑side injection.

Affected Systems

The affected product is WordPress Penci Podcast plugin provided by PenciDesign. Versions from the earliest release through version 1.7 are vulnerable; no specific version numbers are listed beyond the upper bound. Security‑aware administrators should ensure that the plugin is updated to a later release where the issue is resolved. The plugin runs within the WordPress environment on any server that hosts a WordPress site and uses the Penci Podcast add‑on.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity. The EPSS probability is very low (<1%), and the vulnerability is not listed in the CISA KEV catalog, implying no known exploitation in the wild. However, because the flaw permits execution of arbitrary JavaScript in the context of a legitimate user, it could be leveraged to steal cookies, perform phishing, or inject further malware. The likely attack vector involves a user visiting a page containing a crafted URL or a malicious link that triggers the plugin’s rendering logic; no authentication or privilege escalation is required. Given the low EPSS, the risk is moderate, but site owners should still address it promptly.

Generated by OpenCVE AI on April 16, 2026 at 00:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Penci Podcast plugin to the latest available version where the XSS flaw is fixed.
  • If an upgrade is not immediately possible, disable the plugin or remove it from the site to eliminate the attack surface.
  • Implement input sanitization policies and consider using a web application firewall to detect and block malicious script payloads.

Generated by OpenCVE AI on April 16, 2026 at 00:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Pencidesign
Pencidesign penci Podcast
Wordpress
Wordpress wordpress
Vendors & Products Pencidesign
Pencidesign penci Podcast
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PenciDesign Penci Podcast penci-podcast allows DOM-Based XSS.This issue affects Penci Podcast: from n/a through <= 1.7.
Title WordPress Penci Podcast plugin <= 1.7 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Pencidesign Penci Podcast
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:15:00.830Z

Reserved: 2026-02-17T13:23:30.505Z

Link: CVE-2026-27058

cve-icon Vulnrichment

Updated: 2026-02-20T17:17:17.889Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:27.097

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-27058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:15:18Z

Weaknesses