Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.4
Wikilookup plugin for WordPress allows attackers to inject malicious code
CVE-2026-3354
Summary
An attacker with admin access can inject malicious code into a WordPress site's pages, potentially allowing them to take control of the site. To fix this, update the Wikilookup plugin to a version higher than 1.1.5. If you can't update, remove the plugin until a fix is available.
Original title
The Wikilookup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Popup Width' setting in all versions up to, and including, 1.1.5. This is due to insufficient input sanitiz...
Original description
The Wikilookup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Popup Width' setting in all versions up to, and including, 1.1.5. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
nvd CVSS3.1
4.4
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026