Home

Description

The Sticky plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `cvmh-sticky` shortcode `readmoretext` attribute in versions up to and including 2.5.6. This is due to insufficient input sanitization and output escaping in the `cvmh_sticky_front_render()` function — the `readmoretext` attribute value is passed through `apply_filters()` and directly concatenated into the HTML output without any escaping function such as `esc_html()`. This makes it possible for authenticated attackers with Contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a page containing the injected shortcode.

PUBLISHED Reserved 2026-04-15 | Published 2026-05-20 | Updated 2026-05-20 | Assigner Wordfence




MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-19:Disclosed

Credits

Djaidja Moundjid finder

References

www.wordfence.com/...-8175-4775-a013-f1e2bef04479?source=cve

plugins.trac.wordpress.org/...y/trunk/includes/functions.php

plugins.trac.wordpress.org/...s/2.5.6/includes/functions.php

plugins.trac.wordpress.org/...y/trunk/includes/shortcode.php

plugins.trac.wordpress.org/...s/2.5.6/includes/shortcode.php

cve.org (CVE-2026-6397)

nvd.nist.gov (CVE-2026-6397)

Download JSON