CVE-2026-4805
Published: Tue, 28 Apr 2026 08:16
Summary
The Woostify plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.5.0 This is due to insufficient input sanitization and output escaping in the bundled
Details
The Woostify plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.5.0 This is due to insufficient input sanitization and output escaping in the bundled Lity.js lightbox library, where user-controlled input from the href attribute is concatenated directly into a jQuery HTML string without sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Are YOU affected by CVE-2026-4805?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-4805 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://github.com/woostify/woostify/commit/a4669598aa8c5de344dda6c3d42389a3c2e61adc
- https://themes.trac.wordpress.org/browser/woostify/2.4.6/assets/js/lity.js#L142
- https://themes.trac.wordpress.org/browser/woostify/2.4.6/assets/js/lity.js#L163
- https://themes.trac.wordpress.org/browser/woostify/2.4.6/assets/js/lity.js#L611
- https://themes.trac.wordpress.org/browser/woostify/2.4.6/assets/js/lity.js#L635
- https://themes.trac.wordpress.org/changeset?old_path=%2Fwoostify/2.5.0&new_path=%2Fwoostify/2.5.1
- https://www.wordfence.com/threat-intel/vulnerabilities/id/883ad6f7-e701-4708-b5d4-69b72ff38499?source=cve
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.