Description
The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'feed_data' parameter keys in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-04
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting leading to arbitrary script execution for site visitors
Action: Immediate Patch
AI Analysis

Impact

The Widgets for Social Photo Feed plugin stores user‑supplied input from the feed_data parameter without sufficient sanitization or escaping. This allows an unauthenticated attacker to inject malicious scripts that are persisted in the plugin’s data and executed whenever a page displaying the injected content is accessed. The injected payload runs with the privileges of the website’s front‑end rendering context, enabling client‑side defacement, cookie theft, or social engineering attempts.

Affected Systems

WordPress sites that rely on the TrustIndex Widgets for Social Photo Feed plugin, specifically all releases up to and including version 1.7.9. Sites using any of these affected plugin versions are vulnerable irrespective of other security controls.

Risk and Exploitability

The CVSS score of 7.2 indicates a high severity, reflecting the significant impact that arbitrary script execution can have on confidentiality and integrity for all users of the affected site. Although EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, the lack of authentication requirement and the persistence of the payload mean that exploitation is straightforward for an attacker with access to the widget configuration interface or by submitting feed_data payloads via the API if exposed. The attack vector is likely local within the WordPress administrative interface, but the effects are visible to all site visitors.

Generated by OpenCVE AI on April 4, 2026 at 11:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Widgets for Social Photo Feed plugin to the latest available version (1.8.0 or newer) via the WordPress plugin repository or by replacing the plugin files from an official source.

Generated by OpenCVE AI on April 4, 2026 at 11:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Trustindex
Trustindex widgets For Social Photo Feed
Wordpress
Wordpress wordpress
Vendors & Products Trustindex
Trustindex widgets For Social Photo Feed
Wordpress
Wordpress wordpress

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'feed_data' parameter keys in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Widgets for Social Photo Feed <= 1.7.9 - Unauthenticated Stored Cross-Site Scripting via feed_data
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Trustindex Widgets For Social Photo Feed
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:42:26.057Z

Reserved: 2026-04-02T13:50:46.791Z

Link: CVE-2026-5425

cve-icon Vulnrichment

Updated: 2026-04-06T15:38:32.326Z

cve-icon NVD

Status : Deferred

Published: 2026-04-04T09:16:20.500

Modified: 2026-04-24T18:13:28.877

Link: CVE-2026-5425

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T22:20:54Z

Weaknesses