Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.4

Investi Plugin for WordPress Allows Attackers to Inject Malicious Code

CVE-2026-3600
Summary

The Investi plugin for WordPress is vulnerable to a security risk that allows attackers to inject malicious code into web pages. This can happen when a user with Contributor-level access and above adds certain attributes to the plugin's shortcode. To protect your site, update the plugin to a version newer than 1.0.26.

Original title
The Investi plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'investi-announcements-accordion' shortcode's 'maximum-num-years' attribute in all versions up to, and includin...
Original description
The Investi plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'investi-announcements-accordion' shortcode's 'maximum-num-years' attribute in all versions up to, and including, 1.0.26. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes. Specifically, the 'maximum-num-years' attribute value is read directly from shortcode attributes and interpolated into a double-quoted HTML attribute without any escaping (no esc_attr(), htmlspecialchars(), or similar). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1 6.4
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 8 Apr 2026 · Updated: 8 Apr 2026 · First seen: 8 Apr 2026