Home

Description

WordPress Theme Wibar 1.1.8 contains a stored cross-site scripting vulnerability in the Brand component that allows authenticated users to inject malicious scripts by manipulating the Logo URL parameter. Attackers with editor, administrator, contributor, or author privileges can inject base64-encoded script payloads through the ftc_brand_url input field to execute arbitrary JavaScript when users visit the brand page.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-16 | Updated 2026-05-18 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.1.8
affected

Credits

Ilca Lucian Florin finder

References

www.exploit-db.com/exploits/49107 (ExploitDB-49107) exploit

demo.themeftc.com/wibar (Official Product Homepage) product

themeforest.net/...sive-woocommerce-wordpress-theme/20994798 (Product Reference) product

www.vulncheck.com/...ross-site-scripting-via-brand-component (VulnCheck Advisory: WordPress Theme Wibar 1.1.8 Stored Cross-Site Scripting via Brand Component) third-party-advisory

cve.org (CVE-2020-37235)

nvd.nist.gov (CVE-2020-37235)

Download JSON