Description
The Total theme for WordPress is vulnerable to Stored Cross-Site Scripting via post titles in versions up to, and including, 2.2.1 due to insufficient output escaping when rendering the_title() inside HTML attribute context in the home blog section template. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Exploitation requires the malicious post to be published and displayed with a featured image in the Home Page blog section.
Published: 2026-05-02
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Total WordPress theme until version 2.2.1 fails to escape output when rendering the post title inside an HTML image alt attribute in the home page blog section. This omission gives authenticated users with contributor or higher privileges the ability to inject malicious JavaScript that runs automatically when a visitor loads a page showing that post. The injected script can hijack the victim's session, deface the site, or perform other client‑side attacks. The vulnerability is a classic stored cross‑site scripting flaw (CWE‑79).

Affected Systems

WordPress installations using the Total theme version 2.2.1 or earlier are affected. Only users who have contributed or higher privileges can create or edit posts; a post must be published and display a featured image in the Home Page blog section for the flaw to be exploitable.

Risk and Exploitability

The CVSS score of 5.4 indicates a medium severity. The exploit requires authenticated access, so the attack will be limited to sites where an attacker can acquire contributor‑level credentials. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog. Because the attacker needs to own or edit a post, the risk is bounded but still significant, especially on sites with many contributors or lax role review. Attackers could target popular blogs to compromise their visitors.

Generated by OpenCVE AI on May 2, 2026 at 11:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Total theme to the latest release, which removes the unsanitized output in the blog section.
  • If an upgrade cannot be performed immediately, temporarily disable or remove the blog section on the front page or configure it to exclude the image alt attribute.
  • Use a role‑management plugin to restrict contributor privileges or require higher roles for editing posts with featured images until the patch is applied.

Generated by OpenCVE AI on May 2, 2026 at 11:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Hashthemes
Hashthemes total
Wordpress
Wordpress wordpress
Vendors & Products Hashthemes
Hashthemes total
Wordpress
Wordpress wordpress

Sat, 02 May 2026 10:00:00 +0000

Type Values Removed Values Added
Description The Total theme for WordPress is vulnerable to Stored Cross-Site Scripting via post titles in versions up to, and including, 2.2.1 due to insufficient output escaping when rendering the_title() inside HTML attribute context in the home blog section template. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Exploitation requires the malicious post to be published and displayed with a featured image in the Home Page blog section.
Title Total <= 2.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Title in Blog Section Image alt Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Hashthemes Total
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T09:26:16.066Z

Reserved: 2026-03-28T14:50:29.776Z

Link: CVE-2026-5077

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T10:16:17.990

Modified: 2026-05-02T10:16:17.990

Link: CVE-2026-5077

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T11:30:41Z

Weaknesses