Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.4

WordPress Multi Post Carousel plugin allows attackers to inject malicious scripts

CVE-2026-1275
Summary

The Multi Post Carousel plugin for WordPress is affected by a security weakness that could allow attackers to inject malicious code into pages. This could happen if an authorized user with contributor-level access or higher adds malicious content to the plugin. To protect your site, update the plugin to a version newer than 1.4.

Original title
The Multi Post Carousel by Category plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slides' shortcode attribute in all versions up to, and including, 1.4. This is due to ...
Original description
The Multi Post Carousel by Category plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slides' shortcode attribute in all versions up to, and including, 1.4. This is due to insufficient input sanitization and output escaping on the user-supplied 'slides' parameter in the post_slides_shortcode function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1 6.4
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026