Description
The Coachific Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'userhash' shortcode attribute in all versions up to and including 1.0. This is due to insufficient input sanitization and output escaping. The plugin uses sanitize_text_field() on the 'userhash' parameter, which strips HTML tags but does not escape characters significant in a JavaScript string context (such as double quotes, semicolons, and parentheses). The sanitized value is then directly interpolated into a JavaScript string within a <script> tag on line 29 without any JavaScript-specific escaping (e.g., wp_json_encode() or esc_js()). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-15
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Update Plugin
AI Analysis

Impact

Coachific Shortcode for WordPress contains a stored cross‑site scripting flaw that originates from the plugin’s handling of the 'userhash' shortcode attribute. The plugin sanitizes the attribute with sanitize_text_field(), which strips out HTML tags but fails to escape characters that are dangerous in a JavaScript string context. Since the sanitized value is interpolated directly inside a <script> tag, an attacker can inject JavaScript code that will run whenever the page is viewed.

Affected Systems

The vulnerability affects all installations of Coachific Shortcode up to and including version 1.0. Systems running WordPress with the plugin installed are at risk; any deployment that allows Contributors or higher to use shortcodes could be exploited.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity. No EPSS score is available, so the current exploitation probability is unclear. The attack requires authenticated Access control—any user with Contributor or higher privileges can use the shortcode to store malicious payloads. Once injected, the script executes in the browsers of all visitors to the affected post or page.

Generated by OpenCVE AI on April 15, 2026 at 10:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of Coachific Shortcode that removes or properly escapes the 'userhash' attribute.
  • If an immediate update is not possible, disable the shortcode functionality or remove the plugin entirely until a fix is available.
  • Restrict user roles so that only administrators can add or edit content containing shortcodes, or otherwise enforce stricter input validation on the 'userhash' field.

Generated by OpenCVE AI on April 15, 2026 at 10:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Coachific
Coachific coachific Shortcode
Wordpress
Wordpress wordpress
Vendors & Products Coachific
Coachific coachific Shortcode
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description The Coachific Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'userhash' shortcode attribute in all versions up to and including 1.0. This is due to insufficient input sanitization and output escaping. The plugin uses sanitize_text_field() on the 'userhash' parameter, which strips HTML tags but does not escape characters significant in a JavaScript string context (such as double quotes, semicolons, and parentheses). The sanitized value is then directly interpolated into a JavaScript string within a <script> tag on line 29 without any JavaScript-specific escaping (e.g., wp_json_encode() or esc_js()). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Coachific Shortcode <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'userhash' Shortcode Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Coachific Coachific Shortcode
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-15T08:28:14.507Z

Reserved: 2026-03-11T18:56:10.776Z

Link: CVE-2026-4005

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-15T09:16:32.717

Modified: 2026-04-15T09:16:32.717

Link: CVE-2026-4005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:53:21Z

Weaknesses