Description
The Text Snippets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `ts` shortcode in all versions up to, and including, 0.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-22
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Update
AI Analysis

Impact

The Text Snippets plugin contains a stored cross‑site scripting flaw in the ‘ts’ shortcode that arises from inadequate input sanitization and output escaping of user‑supplied attributes. The problem is a typical CWE‑79 vulnerability that lets attackers inject arbitrary JavaScript which will run in the browsers of any user who views the affected page. This can lead to theft of session cookies, defacement, or redirection to malicious sites. The risk is limited to the context of the WordPress site where the plugin is installed, but it can be leveraged to compromise all visitors who access the injected content.

Affected Systems

The vulnerability affects the snedled:Text Snippets WordPress plugin. All released versions of the plugin up to and including 0.0.1 are impacted. No other WordPress core or plugin versions are listed as affected.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. EPSS data is not available, and the advisory is not listed in the CISA KEV catalog. The flaw requires the attacker to have at least contributor‑level authentication, meaning the attacker must log in with a WordPress account that has permission to add or edit snippets. Once authenticated, the attacker can embed malicious code that will execute in the browsers of all users who open the injected page. Because it is an authenticated attack vector, mitigation through role management or strict permission handling can reduce exploitation risk, but the most secure remedy is to patch or remove the vulnerable plugin.

Generated by OpenCVE AI on April 22, 2026 at 09:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Text Snippets plugin to the newest version available that addresses the XSS flaw, if such a release exists.
  • If upgrading is not possible, restrict contributor‑level or higher WordPress roles from using or editing snippets that employ the vulnerable ‘ts’ shortcode, or remove that shortcode entirely from public content.
  • Sanitize or escape all user inputs to the ‘ts’ shortcode and review the plugin’s code to ensure proper output escaping before deployment.

Generated by OpenCVE AI on April 22, 2026 at 09:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Snedled
Snedled text Snippets
Wordpress
Wordpress wordpress
Vendors & Products Snedled
Snedled text Snippets
Wordpress
Wordpress wordpress

Wed, 22 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Text Snippets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `ts` shortcode in all versions up to, and including, 0.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Text Snippets <= 0.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'w' Shortcode Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Snedled Text Snippets
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-22T15:31:23.711Z

Reserved: 2026-04-07T15:09:42.695Z

Link: CVE-2026-5748

cve-icon Vulnrichment

Updated: 2026-04-22T15:26:32.924Z

cve-icon NVD

Status : Received

Published: 2026-04-22T09:16:25.700

Modified: 2026-04-22T09:16:25.700

Link: CVE-2026-5748

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:43:58Z

Weaknesses