Description
The NMR Strava activities plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `strava_nmr_connect` shortcode in all versions up to, and including, 1.0.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-05-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The NMR Strava activities WordPress plugin allows any authenticated user with contributor‑level access to craft shortcode attributes that are not properly sanitized or escaped. By inserting malicious markup into a "strava_nmr_connect" shortcode, an attacker can store arbitrary JavaScript or HTML. When any visitor loads the page containing the injected shortcode, the attacker's code runs in that visitor’s browser, potentially stealing session cookies, hijacking the user’s account, or defacing the site. This is a classic Stored Cross‑Site Scripting vulnerability (CWE‑79).

Affected Systems

The vulnerability exists in all releases of the NMR Strava activities plugin from mirceatm up to and including version 1.0.14. No other versions or components are known to be affected.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate baseline risk. Because the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, the likelihood of widespread exploitation is moderate but not negligible. Attacking requires only contributor‑level permissions, a role that is commonly granted in many WordPress installations. Once the short­code is populated with a malicious attribute, the payload is automatically stored and will run for any site visitor, giving attackers persistent, client‑side code execution capabilities.

Generated by OpenCVE AI on May 8, 2026 at 11:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the NMR Strava activities plugin to version 1.0.15 or later to eliminate flaw.
  • If an upgrade cannot be performed immediately, remove all "strava_nmr_connect" shortcodes from existing content or employ a site‑wide filter to escape their attributes.
  • Restrict contributor roles from editing any content that may contain the "strava_nmr_connect" shortcode until the plugin is updated or removed.

Generated by OpenCVE AI on May 8, 2026 at 11:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Mirceatm
Mirceatm nmr Strava Activities
Wordpress
Wordpress wordpress
Vendors & Products Mirceatm
Mirceatm nmr Strava Activities
Wordpress
Wordpress wordpress

Fri, 08 May 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 10:00:00 +0000

Type Values Removed Values Added
Description The NMR Strava activities plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `strava_nmr_connect` shortcode in all versions up to, and including, 1.0.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title NMR Strava activities <= 1.0.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Mirceatm Nmr Strava Activities
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-08T10:15:32.703Z

Reserved: 2026-04-01T14:43:10.573Z

Link: CVE-2026-5341

cve-icon Vulnrichment

Updated: 2026-05-08T10:15:27.583Z

cve-icon NVD

Status : Received

Published: 2026-05-08T10:16:28.917

Modified: 2026-05-08T10:16:28.917

Link: CVE-2026-5341

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T12:00:08Z

Weaknesses