Description
The Affiliate Program Suite — SliceWP Affiliates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcode attributes in all versions up to, and including, 1.2.7. This is due to insufficient input sanitization and output escaping on user-supplied attributes in the 'slicewp_affiliate_url' shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-05-06
Score: 6.4 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Affiliate Program Suite – SliceWP Affiliates plugin for WordPress is vulnerable to Stored Cross‑Site Scripting via attributes in the slicewp_affiliate_url shortcode. Shortcode attributes are not sanitized or escaped, allowing an authenticated user with contributor-level access or above to inject arbitrary JavaScript that will run when any page containing the shortcode is viewed. The flaw represents a classic client‑side injection weakness (CWE‑79) that can compromise user sessions, deface content, or serve malware.

Affected Systems

WordPress sites running the Affiliate Program Suite – SliceWP Affiliates plugin version 1.2.7 or earlier are affected. The vulnerability applies to all WordPress installations where the plugin is active and contributors or higher roles can create or edit content that includes the slicewp_affiliate_url shortcode.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate security impact. The attack requires authenticated access with at least contributor privileges; therefore it is not an open‑world vector but still poses a risk to sites with widely distributed or compromised contributor accounts. The absence of an EPSS score and the lack of a KEV listing suggest the flaw is not yet widely exploited, but the potential for client‑side script execution remains significant if an attacker can inject content.

Generated by OpenCVE AI on May 6, 2026 at 08:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the SliceWP plugin to a patched release that implements proper input sanitization and output escaping for the slicewp_affiliate_url shortcode.
  • If an update is not yet available, restrict the use of the slicewp_affiliate_url shortcode for contributors and higher roles by disabling it or removing it from the list of allowed shortcodes.
  • Deploy a Content Security Policy that blocks inline scripts and limits script execution to trusted domains to mitigate any XSS that may still be possible.
  • Consider removing the plugin entirely if the functionality is not required, or replace it with a more secure affiliate management solution.

Generated by OpenCVE AI on May 6, 2026 at 08:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Iovamihai
Iovamihai affiliate Program Suite — Slicewp Affiliates
Wordpress
Wordpress wordpress
Vendors & Products Iovamihai
Iovamihai affiliate Program Suite — Slicewp Affiliates
Wordpress
Wordpress wordpress

Wed, 06 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description The Affiliate Program Suite — SliceWP Affiliates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcode attributes in all versions up to, and including, 1.2.7. This is due to insufficient input sanitization and output escaping on user-supplied attributes in the 'slicewp_affiliate_url' shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Affiliate Program Suite <= 1.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via slicewp_affiliate_url Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-06T06:47:20.670Z

Reserved: 2026-04-20T13:38:24.353Z

Link: CVE-2026-6672

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T08:16:03.957

Modified: 2026-05-06T08:16:03.957

Link: CVE-2026-6672

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T09:21:14Z

Weaknesses