CVE-2026-27070
Published: 19 March 2026
Summary
CVE-2026-27070 is a high-severity Cross-site Scripting (CWE-79) vulnerability. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 11.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper neutralization during web page generation by filtering outputs to prevent execution of stored malicious scripts in browsers.
Validates and sanitizes untrusted inputs to Everest Forms Pro to block crafted scripts from being stored persistently on the site.
Remediates the specific flaw in Everest Forms Pro versions through <=1.9.12 by identifying, testing, and applying patches that fix the XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS enables arbitrary JS execution in admin browsers, directly facilitating session hijacking (T1185) and web cookie theft (T1539) via crafted form submissions.
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPEverest Everest Forms Pro everest-forms-pro allows Stored XSS.This issue affects Everest Forms Pro: from n/a through <= 1.9.12.
Deeper analysisAI
CVE-2026-27070 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Stored Cross-site Scripting (XSS) under CWE-79, affecting the WPEverest Everest Forms Pro WordPress plugin (everest-forms-pro). Published on 2026-03-19, it impacts all versions from n/a through 1.9.12 inclusive. The vulnerability arises from inadequate input sanitization during web page generation, allowing malicious scripts to be stored and later executed.
With a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), the issue is exploitable by unauthenticated attackers over the network with low complexity, though it requires user interaction such as viewing a malicious form submission. Attackers can submit crafted input via Everest Forms Pro that persists on the site, executing arbitrary JavaScript in the browsers of authenticated users or administrators who access affected pages. This can result in low-level impacts to confidentiality, integrity, and availability, with changed scope due to cross-origin effects.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/everest-forms-pro/vulnerability/wordpress-everest-forms-pro-plugin-1-9-10-cross-site-scripting-xss-vulnerability?_s_id=cve provides additional details on the vulnerability, including potential mitigation steps for affected WordPress installations.
Details
- CWE(s)