Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uicore UiCore Elements uicore-elements allows Stored XSS.This issue affects UiCore Elements: from n/a through <= 1.3.14.
Published: 2026-04-08
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting in UiCore Elements plugin that can lead to client‑side script execution, cookie theft, phishing, or defacement.
Action: Patch Immediately
AI Analysis

Impact

The plugin stores user‑supplied content without proper sanitization, enabling stored XSS attacks. This allows an attacker to inject malicious JavaScript into stored data that is later rendered, leading to client‑side code execution, session hijacking or site defacement. The flaw is a typical cross‑site scripting weakness (CWE‑79). This vulnerability can affect any user who visits a page that displays the injected content, potentially compromising confidentiality, integrity and availability of the affected site.

Affected Systems

The issue applies to the WordPress UiCore Elements plugin by the vendor uicore, affecting all releases up to and including version 1.3.14. No pre‑1.3.14 versions were patched already. Any WordPress installation that uses this plugin version is vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. EPSS is less than 1%, so exploitation is considered unlikely at present, and the weakness has not been catalogued by CISA's KEV list. Exploitation requires the attacker to insert malicious payloads into the plugin’s stored content – typically through the plugin’s content editor or any interface that accepts HTML input. Since the payload is stored, once an authorized or anonymous user views the affected page, the injected script runs in the victim’s browser. The impact is limited to the client side, so no direct server compromise is achieved unless the attacker can leverage other vulnerabilities.

Generated by OpenCVE AI on April 8, 2026 at 15:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the UiCore Elements plugin to the latest version (>= 1.3.15).
  • Verify that all stored content has not been corrupted, and delete or sanitize any entries containing injected scripts. If an upgrade is not immediately possible, disable or uninstall the plugin until the vulnerability is addressed. Monitor the site for suspicious activity and review access logs for unauthorized data modifications.

Generated by OpenCVE AI on April 8, 2026 at 15:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uicore UiCore Elements uicore-elements allows Stored XSS.This issue affects UiCore Elements: from n/a through <= 1.3.14.
Title WordPress UiCore Elements plugin <= 1.3.14 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-08T13:19:03.025Z

Reserved: 2026-04-07T10:58:22.476Z

Link: CVE-2026-39708

cve-icon Vulnrichment

Updated: 2026-04-08T13:18:40.321Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T09:16:43.620

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-39708

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:40:09Z

Weaknesses