Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.1

WordPress Xmlrpc Attacks Blocker Plugin Exposes Admins to Malware When Viewing Logs

CVE-2026-2502
Summary

The Xmlrpc Attacks Blocker plugin for WordPress is vulnerable to a security risk that allows hackers to inject malicious code into the debug logs, which can be executed when an administrator views the logs. This can happen if you're using version 1.0 or earlier. Update to a newer version of the plugin to fix this issue.

Original title
The xmlrpc attacks blocker plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0, via the 'X-Forwarded-For' HTTP header. This is due to the plugin ...
Original description
The xmlrpc attacks blocker plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0, via the 'X-Forwarded-For' HTTP header. This is due to the plugin trusting and logging attacker-controlled IP header data and rendering debug log entries without output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the debug log page.
nvd CVSS3.1 6.1
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026