Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.4
Ad Short plugin for WordPress: Malicious ads can inject malicious scripts
CVE-2026-4067
Summary
The Ad Short plugin for WordPress is used by attackers to inject malicious scripts into pages. This can happen when a user with contributor access or higher edits a page with an 'ad' shortcode. To fix this, update the plugin to the latest version, which includes security patches to prevent this issue.
Original title
The Ad Short plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ad' shortcode's 'client' attribute in all versions up to and including 2.0.1. This is due to insufficient inp...
Original description
The Ad Short plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ad' shortcode's 'client' attribute in all versions up to and including 2.0.1. This is due to insufficient input sanitization and output escaping on the 'client' shortcode attribute. The ad_func() shortcode handler at line 71 accepts a 'client' attribute via shortcode_atts() and directly concatenates it into a double-quoted HTML attribute (data-ad-client) at line 130 without applying esc_attr() or any other sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1
6.4
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://plugins.trac.wordpress.org/browser/ad-short/tags/2.0.1/ad_short.php#L130
- https://plugins.trac.wordpress.org/browser/ad-short/tags/2.0.1/ad_short.php#L77
- https://plugins.trac.wordpress.org/browser/ad-short/trunk/ad_short.php#L130
- https://plugins.trac.wordpress.org/browser/ad-short/trunk/ad_short.php#L77
- https://www.wordfence.com/threat-intel/vulnerabilities/id/313d2749-7662-4870-b0f...
Published: 21 Mar 2026 · Updated: 21 Mar 2026 · First seen: 21 Mar 2026