Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.4

Strong Testimonials Plugin for WordPress Allows Attackers to Execute Scripts

CVE-2026-3239
Summary

The Strong Testimonials plugin for WordPress has a security flaw that allows someone with contributor-level access to inject malicious code into pages, which can be executed when users visit those pages. This means that if your website uses this plugin, you should update it to the latest version to prevent potential attacks. You can do this by logging in to your WordPress dashboard and checking for updates.

Original title
The Strong Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's testimonial_view shortcode in all versions up to, and including, 3.2.21 due to insufficien...
Original description
The Strong Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's testimonial_view shortcode in all versions up to, and including, 3.2.21 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1 6.4
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 8 Apr 2026 · Updated: 8 Apr 2026 · First seen: 8 Apr 2026