Description
The Private WP suite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Exceptions' setting in all versions up to, and including, 0.4.1. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2026-04-22
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Update Plugin
AI Analysis

Impact

The Private WP suite plugin contains a stored cross‑site scripting flaw in the Exceptions setting caused by insufficient input sanitization and output escaping. An attacker who can log in with Administrator level or higher privileges can inject malicious scripts that will run whenever a user views an affected page. These injected scripts execute in the victim’s browser when the page is viewed. This weakness is listed as CWE‑79.

Affected Systems

Vendor: Private WP suite. Product: Private WP suite plugin for WordPress. All released versions up to and including 0.4.1 are affected. The vulnerability is only present in multi‑site WordPress installations where the unfiltered_html capability is disabled.

Risk and Exploitability

The CVSS score of 4.4 indicates a moderate risk level. No EPSS score is available, so the current exploitation probability is unknown. The vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires authenticated Administrator‑level access and the presence of the multi‑site configuration, implying a higher potential impact on sites with broader administrative scopes. Once a legitimate administrator injects the script, it will be delivered to all users accessing the affected page, making it a serious threat for environments where users browse the site frequently.

Generated by OpenCVE AI on April 22, 2026 at 11:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Private WP suite to a version newer than 0.4.1
  • If upgrading is not immediately possible, remove or disable the Private WP suite plugin from the site
  • Apply input validation and output escaping to the Exceptions setting to prevent script injection

Generated by OpenCVE AI on April 22, 2026 at 11:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Fpoller
Fpoller private Wp Suite
Wordpress
Wordpress wordpress
Vendors & Products Fpoller
Fpoller private Wp Suite
Wordpress
Wordpress wordpress

Wed, 22 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Private WP suite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Exceptions' setting in all versions up to, and including, 0.4.1. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title Private WP suite <= 0.4.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'Exceptions' Setting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Fpoller Private Wp Suite
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-22T07:45:40.547Z

Reserved: 2026-02-18T21:11:15.769Z

Link: CVE-2026-2719

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T09:16:21.130

Modified: 2026-04-22T09:16:21.130

Link: CVE-2026-2719

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:43:56Z

Weaknesses