CVE-2026-6725
Published: Tue, 28 Apr 2026 06:16
Summary
The WPC Smart Messages for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'text' attribute of the `wpcsm_text_rotator` shortcode in all versions up to, and inclu
Details
The WPC Smart Messages for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'text' attribute of the `wpcsm_text_rotator` shortcode in all versions up to, and including, 4.2.8. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Are YOU affected by CVE-2026-6725?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-6725 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://plugins.trac.wordpress.org/browser/wpc-smart-messages/tags/4.2.8/includes/class-shortcode.php#L458
- https://plugins.trac.wordpress.org/browser/wpc-smart-messages/tags/4.2.9/includes/class-shortcode.php#L450
- https://plugins.trac.wordpress.org/browser/wpc-smart-messages/tags/4.2.9/includes/class-shortcode.php#L459
- https://wordpress.org/plugins/wpc-smart-messages
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9c1ac689-329a-4459-8b67-176e959cc02d?source=cve
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.