CVE-2026-2936
HIGHCVSS v3
7.2
HIGH
EPSS Score
—
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_title' parameter in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an admin user accesses the Traffic by Title section.
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 4/4/2026
- Last Modified
- 4/7/2026
Frequently Asked Questions
What is CVE-2026-2936?
The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_title' parameter in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an admin user accesses the Traffic by Title section.
Is CVE-2026-2936 actively exploited?
Active exploitation of CVE-2026-2936 has not been confirmed. The EPSS score is N/A%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2026-2936?
CVE-2026-2936 has a CVSS v3 base score of 7.2 (HIGH severity), with vector string 3.1.
Is CVE-2026-2936 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.