Description
The CodeColorer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' parameter in 'cc' comment shortcode in versions up to, and including, 0.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Exploitation requires comments to be enabled on the target post and guest comments to be allowed.
Published: 2026-04-16
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting
Action: Patch
AI Analysis

Impact

The CodeColorer plugin for WordPress is vulnerable to a stored cross‑site scripting flaw caused by inadequate input sanitization and output escaping of the 'class' parameter in the 'cc' comment shortcode. An unauthenticated attacker can inject arbitrary JavaScript into a comment, which is stored in the database and delivered to any visitor who views the comment. The injected script runs in the context of the site and can be used to hijack user sessions, deface the site, or perform other malicious client‑side actions. The weakness is classified as CWE‑79.

Affected Systems

WordPress sites using the CodeColorer plugin version 0.10.1 or earlier are affected. The vulnerability applies to installations where comments are enabled on the target post and guest comments are permitted. The product is identified as kpumuk:CodeColorer.

Risk and Exploitability

The vulnerability scores 6.1 on the CVSS scale, indicating a medium severity risk. EPSS is not available, and the issue is not listed in the CISA KEV catalog. The attack vector is web‑based and requires unauthenticated access to the comment interface; successful exploitation could impact all users who view the compromised page.

Generated by OpenCVE AI on April 16, 2026 at 08:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update CodeColorer to the latest version (0.10.2 or later) to remove the unsanitized 'class' attribute
  • Disable guest comments on the WordPress site or remove the 'cc' shortcode from comments entirely
  • If an immediate update is not possible, apply proper escaping to the 'class' value in the plugin’s shortcode handling code

Generated by OpenCVE AI on April 16, 2026 at 08:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Kpumuk
Kpumuk codecolorer
Wordpress
Wordpress wordpress
Vendors & Products Kpumuk
Kpumuk codecolorer
Wordpress
Wordpress wordpress

Thu, 16 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
Description The CodeColorer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' parameter in 'cc' comment shortcode in versions up to, and including, 0.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Exploitation requires comments to be enabled on the target post and guest comments to be allowed.
Title CodeColorer <= 0.10.1 - Unauthenticated Stored Cross-Site Scripting via 'class' attribute in 'cc' Comment Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Kpumuk Codecolorer
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-16T13:01:34.884Z

Reserved: 2026-03-12T00:54:16.262Z

Link: CVE-2026-4032

cve-icon Vulnrichment

Updated: 2026-04-16T13:01:31.454Z

cve-icon NVD

Status : Received

Published: 2026-04-16T04:17:10.890

Modified: 2026-04-16T04:17:10.890

Link: CVE-2026-4032

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:11:57Z

Weaknesses