Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.1
Comment Genius plugin for WordPress allows malicious scripts to be injected
CVE-2026-1647
Summary
The Comment Genius plugin for WordPress is not properly protecting against malicious code. This means that an attacker could trick a user into clicking on a link, allowing them to inject malicious scripts on the website. To fix this, update the plugin to the latest version, which should have this issue resolved.
Original title
The Comment Genius plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 1.2.5 due to insufficient inpu...
Original description
The Comment Genius plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
nvd CVSS3.1
6.1
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026