Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.4
Salavat Counter Plugin for WordPress: Unauthenticated Admin Access via Image URL
CVE-2026-1047
Summary
The Salavat Counter WordPress plugin contains a security flaw that allows hackers with administrator access to inject malicious code into website pages. This can happen when a hacker with admin access edits a page with a specific image URL. To fix this, update the Salavat Counter plugin to version 0.9.6 or later.
Original title
The salavat counter Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'image_url' parameter in all versions up to, and including, 0.9.5 due to insufficient input sani...
Original description
The salavat counter Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'image_url' parameter in all versions up to, and including, 0.9.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1
4.4
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://downloads.wordpress.org/plugin/salavat-counter.zip
- https://plugins.trac.wordpress.org/browser/salavat-counter/tags/0.9.5/wp-table-o...
- https://plugins.trac.wordpress.org/browser/salavat-counter/trunk/wp-table-option...
- https://wordpress.org/plugins/salavat-counter/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6696b262-c6e5-4413-b7d...
Published: 19 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026