Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.4
TP2WP Importer plugin for WordPress can execute malicious scripts
CVE-2026-2489
Summary
An attacker with administrator access can inject malicious code that runs when users visit the attachment importer settings page. This can happen if you're using the TP2WP Importer plugin and haven't updated it. Update the plugin to a version higher than 1.1 to fix this issue.
Original title
The TP2WP Importer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Watched domains' textarea on the attachment importer settings page in all versions up to, and including...
Original description
The TP2WP Importer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Watched domains' textarea on the attachment importer settings page in all versions up to, and including, 1.1. This is due to insufficient input sanitization and output escaping when domains are saved via AJAX and rendered with echo implode() without esc_textarea(). This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the attachment importer settings page.
nvd CVSS3.1
4.4
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 26 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026