Description
The Voyage Plus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' attribute of the 'post-content' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-05-12
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Voyage Plus WordPress plugin (up to and including version 1.0.6). Insufficient input sanitization of the 'class' attribute in the 'post-content' shortcode allows an attacker who can log into the site with contributor‑level or higher permissions to store malicious JavaScript code in a page. When an authenticated user creates or edits a page containing the crafted shortcode, the malicious script is persisted in the database and will execute in the browsers of any subsequent visitor to that page, enabling session hijacking, data theft, or defacement. The weakness aligns with CWE‑79, a classic stored XSS flaw.

Affected Systems

All WordPress installations using the Voyage Plus plugin version 1.0.6 or earlier are affected. The plugin is distributed by scui2 as Voyage Plus. No specific WordPress core or PHP version information is supplied, so any environment running the vulnerable plugin should be considered at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. EPSS data is not available, so a quantitative likelihood of exploitation cannot be determined from the current data. The vulnerability is not listed in the CISA KEV catalog. It is inferrable that the attack requires authenticated access with at least contributor rights; therefore an attack path would involve an attacker logging into the site (or credential compromise) and exploiting the shortcode input that is not trimmed of arbitrary scripts. Once leveraged, the malicious code runs in the context of any user visiting the induced page.

Generated by OpenCVE AI on May 12, 2026 at 10:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Voyage Plus to the latest stable release that removes the vulnerable shortcode handling.
  • Limit contributor‑level or higher users to trusted personnel until the plugin update is available; consider revoking author/contributor roles that are not needed.
  • Implement a strong content security policy (CSP) header or deploy a XSS filtering plugin to mitigate the impact of any injected scripts.
  • Consider disabling the 'post-content' shortcode or sanitizing its attributes manually via a site‑wide filter as an interim workaround.

Generated by OpenCVE AI on May 12, 2026 at 10:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Voyage Plus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' attribute of the 'post-content' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Voyage Plus <= 1.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'post-content' Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-12T16:50:03.525Z

Reserved: 2026-04-06T17:43:13.616Z

Link: CVE-2026-5715

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-12T09:16:55.097

Modified: 2026-05-12T14:03:52.757

Link: CVE-2026-5715

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T10:45:14Z

Weaknesses