Description
The WP Visitor Statistics (Real Time Traffic) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wsm_showDayStatsGraph' shortcode in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting allowing authenticated users to inject and execute malicious scripts in other users’ browsers
Action: Immediate Patch
AI Analysis

Impact

The WP Visitor Statistics (Real Time Traffic) WordPress plugin contains a stored cross‑site scripting weakness in the wsm_showDayStatsGraph shortcode. The plugin fails to sanitize or escape the user‑supplied "height" attribute, enabling attackers with contributor‑level or higher privileges to embed arbitrary JavaScript into pages. This represents a classic reflected XSS flaw (CWE‑79) that can compromise user confidentiality and session integrity.

Affected Systems

The vulnerability is present in all releases of the WP Visitor Statistics (Real Time Traffic) plugin up to and including version 8.4, distributed by the vendor osamaesh. Any WordPress site that has installed this plugin and has users with contributor or higher roles is potentially affected.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack requires an authenticated user with contribution rights to insert the malicious attribute; once inserted, the script runs whenever any visitor loads the affected page. Because the flaw leads to arbitrary code execution in the context of the victim’s browser, it can result in session hijacking, data theft, or defacement. With a moderate probability of exploitation, deploying a patch or mitigating the attack surface is strongly recommended.

Generated by OpenCVE AI on April 8, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP Visitor Statistics (Real Time Traffic) plugin to the latest version or uninstall it if no upgrade is available.
  • If an immediate update is not possible, revoke contributor or higher privileges from users who do not need them to limit potential attackers.
  • Review and update all other WordPress plugins for similar XSS vulnerabilities and apply vendor patches promptly.

Generated by OpenCVE AI on April 8, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Osama.esh
Osama.esh wp Visitor Statistics (real Time Traffic)
Wordpress
Wordpress wordpress
Vendors & Products Osama.esh
Osama.esh wp Visitor Statistics (real Time Traffic)
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
Description The WP Visitor Statistics (Real Time Traffic) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wsm_showDayStatsGraph' shortcode in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WP Visitor Statistics (Real Time Traffic) <= 8.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'height' Shortcode Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Osama.esh Wp Visitor Statistics (real Time Traffic)
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T18:48:12.685Z

Reserved: 2026-03-16T20:17:07.038Z

Link: CVE-2026-4303

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T10:16:02.173

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-4303

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:39:56Z

Weaknesses