The Slider Bootstrap Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'category' and 'template' shortcode attributes in all versions up to and including 1.0.7. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes. The plugin uses extract() on shortcode_atts() to parse attributes, then directly outputs the $category variable into multiple HTML attributes (id, data-target, href) on lines 38, 47, 109, and 113 without applying esc_attr(). Similarly, the $template attribute flows into a class attribute on line 93 without escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Felipermendes
Felipermendes slider Bootstrap Carousel Wordpress Wordpress wordpress |
|
| Vendors & Products |
Felipermendes
Felipermendes slider Bootstrap Carousel Wordpress Wordpress wordpress |
Wed, 22 Apr 2026 08:30:00 +0000
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-04-22T07:45:32.908Z
Updated: 2026-04-22T12:15:44.853Z
Reserved: 2026-03-12T19:57:39.259Z
Link: CVE-2026-4076
Updated: 2026-04-22T12:15:31.767Z
Status : Received
Published: 2026-04-22T09:16:22.117
Modified: 2026-04-22T09:16:22.117
Link: CVE-2026-4076
No data.