Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Composer td-composer allows Stored XSS.This issue affects tagDiv Composer: from n/a through <= 5.4.3.
Published: 2026-04-08
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

This vulnerability arises from improper input sanitization in the tagDiv Composer plugin, allowing attackers to store malicious scripts that run in the browser of anyone who views the affected content. The stored JavaScript can be used to steal session cookies, deface sites, or redirect users to malicious sites, thereby compromising confidentiality and integrity of data seen by site visitors.

Affected Systems

WordPress sites running the tagDiv Composer plugin version 5.4.3 or earlier are affected. This includes all releases from the earliest version up through 5.4.3, regardless of minor patch levels. Site owners using the plugin should check their WordPress installation for the presence of tagDiv Composer and verify the current version.

Risk and Exploitability

The CVSS base score of 6.5 indicates a moderate risk, and the EPSS score of less than 1 % suggests a low probability of widespread exploitation. The vulnerability is not listed in CISA’s KEV catalog, further indicating limited evidence of active attacks. Attackers can exploit the flaw by creating or editing content within the Composer interface, injecting JavaScript that is then rendered to all page visitors. Because the payload is stored, the attack is persistent and can affect authenticated and unauthenticated users alike.

Generated by OpenCVE AI on April 8, 2026 at 16:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the tagDiv Composer plugin to version 5.4.4 or later.
  • If a newer version is unavailable, consider disabling the plugin until an update is released.
  • Remove any suspicious or injected scripts from existing content managed by Composer.
  • Configure the site to enforce strict content sanitization by enabling WordPress’ built‑in sanitization filters or using a security plugin.

Generated by OpenCVE AI on April 8, 2026 at 16:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Tagdiv
Tagdiv tagdiv Composer
Wordpress
Wordpress wordpress
Vendors & Products Tagdiv
Tagdiv tagdiv Composer
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Composer td-composer allows Stored XSS.This issue affects tagDiv Composer: from n/a through <= 5.4.3.
Title WordPress tagDiv Composer plugin <= 5.4.3 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Tagdiv Tagdiv Composer
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:03.946Z

Reserved: 2026-04-07T10:58:10.483Z

Link: CVE-2026-39692

cve-icon Vulnrichment

Updated: 2026-04-08T14:34:41.038Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:41.520

Modified: 2026-04-24T18:05:35.730

Link: CVE-2026-39692

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:40:28Z

Weaknesses