Description
The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.5.0.4. This is due to insufficient input sanitization and output escaping in the prepareCellOutput() method of the LinkWDTColumn, ImageWDTColumn, and EmailWDTColumn classes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, given that they can trick an Administrator into importing data from an attacker-controlled source and the affected column types (Link, Image, or Email) are configured.
Published: 2026-04-20
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Stored Cross‑Site Scripting
Action: Patch Plugin
AI Analysis

Impact

This vulnerability is a stored cross‑site scripting flaw in wpDataTables, a WordPress plugin. Insufficient sanitization and escaping of data in the prepareCellOutput() method allows an attacker to embed malicious scripts into table cells of the Link, Image, or Email column types. When a user opens a page containing the compromised table, the arbitrary script executes in the user’s browser, potentially enabling cookie theft, session hijacking, defacement, or other client‑side attacks. The flaw is classified as CWE-79.

Affected Systems

WordPress installations running wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin version 6.5.0.4 or earlier. The vulnerability affects any site that uses the Link, Image, or Email column types within the plugin.

Risk and Exploitability

The CVSS score of 4.7 indicates a medium impact, and the EPSS score is currently not available, so the likelihood of exploitation is uncertain. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it by tricking an administrator into importing a malicious CSV or Excel file containing script‑laden data; this is inferred from the description and is a remote attack vector with the prerequisite of an admin action. Once the data is imported, any user who visits the page will have the script executed in their browser.

Generated by OpenCVE AI on April 20, 2026 at 23:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the wpDataTables plugin to a version newer than 6.5.0.4.
  • Disable or remove the ability to import external CSV/Excel files until the patch is applied by restricting the import feature to trusted users only.
  • If an update cannot be applied immediately, manually sanitize imported data by ensuring that Link, Image, and Email columns contain only trusted and properly escaped content.

Generated by OpenCVE AI on April 20, 2026 at 23:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.5.0.4. This is due to insufficient input sanitization and output escaping in the prepareCellOutput() method of the LinkWDTColumn, ImageWDTColumn, and EmailWDTColumn classes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, given that they can trick an Administrator into importing data from an attacker-controlled source and the affected column types (Link, Image, or Email) are configured.
Title wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin <= 6.5.0.4 - Unauthenticated Stored Cross-Site Scripting via CSV/Excel Data Import
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-20T22:25:26.695Z

Reserved: 2026-04-06T20:31:13.417Z

Link: CVE-2026-5721

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-20T23:16:24.403

Modified: 2026-04-20T23:16:24.403

Link: CVE-2026-5721

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:00:13Z

Weaknesses