Description
The Cost of Goods by PixelYourSite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'csvdata[0][cost_of_goods_value]' parameter in versions up to, and including, 1.2.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-05-20
Score: 7.2 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Cost of Goods by PixelYourSite plugin for WordPress is vulnerable because the csvdata[0][cost_of_goods_value] parameter is accepted without adequate sanitization or escaping. A malicious user can store arbitrary JavaScript code in the plugin’s data import, causing the code to run when any site visitor views a page that pulls the injected data. This stored XSS flaw could be used to hijack user sessions, deface content, redirect victims, or otherwise compromise the security of the site, as identified by CWE‑79.

Affected Systems

The vulnerability affects the PixelYourSite "Cost of Goods by PixelYourSite" plugin for WordPress versions 1.2.12 and earlier. No other vendor or product versions are listed as affected.

Risk and Exploitability

With a CVSS score of 7.2 the flaw carries a medium‑high severity rating. The EPSS score is unavailable and the issue is not listed in CISA’s KEV catalog. Because the attack vector is unauthenticated and can be exercised via the public CSV import interface, the likelihood of exploitation is significant for any active site using the affected plugin version.

Generated by OpenCVE AI on May 20, 2026 at 17:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Cost of Goods by PixelYourSite plugin to version 1.2.13 or later, which includes proper input sanitization and output escaping for the csvdata[0][cost_of_goods_value] field.
  • If an immediate upgrade is not possible, restrict the CSV import functionality to only authenticated, privileged users or temporarily disable the import feature until the patch is applied.
  • Apply a Content‑Security‑Policy header that limits executable scripts to trusted sources, which can mitigate the impact of any remaining stored XSS content while awaiting the official fix.

Generated by OpenCVE AI on May 20, 2026 at 17:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description The Cost of Goods by PixelYourSite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'csvdata[0][cost_of_goods_value]' parameter in versions up to, and including, 1.2.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Cost of Goods by PixelYourSite <= 1.2.12 - Unauthenticated Stored Cross-Site Scripting via Cost of Goods Import
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-20T17:33:43.416Z

Reserved: 2026-05-01T12:24:51.352Z

Link: CVE-2026-7613

cve-icon Vulnrichment

Updated: 2026-05-20T17:33:26.715Z

cve-icon NVD

Status : Deferred

Published: 2026-05-20T17:16:29.163

Modified: 2026-05-20T17:33:05.830

Link: CVE-2026-7613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T17:30:35Z

Weaknesses