Description
The Draft List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Draft Post Title in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The unescaped injection path is triggered specifically when the viewing user lacks edit capabilities, meaning payloads embedded in draft post titles via attribute-breakout techniques execute for unauthenticated users and subscribers.
Published: 2026-05-22
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Draft List WordPress plugin allows authenticated users with author or higher privileges to store arbitrary code in draft post titles. When a user who cannot edit the draft views the page, the title is rendered without proper escaping, causing the injected script to execute in the visitor’s browser. This leads to a classic cross‑site scripting flaw (CWE‑79) that can hijack sessions, steal cookies, or deface the page for all users who encounter the injected title, including unauthenticated visitors and subscribers.

Affected Systems

The vulnerability affects the Draft List plugin for WordPress versions up to and including 2.6.3. Users running any of these releases are at risk until they update to a patched version.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity, and the lack of EPS rating suggests low exploitation probability at present. The flaw is not listed in CISA’s KEV catalog. Attackers must first authenticate as authors or higher to inject the payload, but any visitor to a page that displays the malicious title will be victimized. The impact is broad and can affect all site users without remedial action. Although the exploit requires author privileges, it can be leveraged to compromise the wider site audience.

Generated by OpenCVE AI on May 22, 2026 at 06:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Draft List plugin to version 2.6.4 or newer.
  • Remove or sanitize any existing draft titles that contain injected script payloads before they are displayed publicly.
  • If possible, configure the plugin or site settings to prevent draft titles from being rendered to users who lack edit capabilities, or deploy a security plugin to block execution of unsanitized JavaScript in titles.

Generated by OpenCVE AI on May 22, 2026 at 06:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Dartiss
Dartiss draft List
Wordpress
Wordpress wordpress
Vendors & Products Dartiss
Dartiss draft List
Wordpress
Wordpress wordpress

Fri, 22 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Draft List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Draft Post Title in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The unescaped injection path is triggered specifically when the viewing user lacks edit capabilities, meaning payloads embedded in draft post titles via attribute-breakout techniques execute for unauthenticated users and subscribers.
Title Draft List <= 2.6.3 - Authenticated (Author+) Stored Cross-Site Scripting via Draft Post Title
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Dartiss Draft List
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-22T12:35:48.269Z

Reserved: 2026-05-20T17:04:18.630Z

Link: CVE-2026-9104

cve-icon Vulnrichment

Updated: 2026-05-22T12:35:43.343Z

cve-icon NVD

Status : Received

Published: 2026-05-22T05:16:28.290

Modified: 2026-05-22T05:16:28.290

Link: CVE-2026-9104

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T06:30:29Z

Weaknesses