CVE-2026-2834
Published: 15 April 2026
Summary
CVE-2026-2834 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the insufficient input sanitization of the 'description' parameter that enables stored XSS injection in the WordPress plugin.
Mitigates the lack of output escaping by filtering injected scripts before they execute in users' browsers on affected pages.
Ensures timely remediation of the known flaw in the plugin versions up to 3.32.3 through patching or removal to prevent exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS in public-facing WordPress plugin enables remote unauthenticated exploitation (T1190) and directly facilitates browser-based credential theft via keylogging (T1056.001), session hijacking (T1185), and web cookie theft (T1539).
NVD Description
The Age Verification & Identity Verification by Token of Trust plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘description’ parameter in all versions up to, and including, 3.32.3 due to insufficient input sanitization and output escaping. This…
more
makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Deeper analysisAI
CVE-2026-2834 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting the Age Verification & Identity Verification by Token of Trust plugin for WordPress in all versions up to and including 3.32.3. The flaw stems from insufficient input sanitization and output escaping of the 'description' parameter, allowing arbitrary web scripts to be injected into pages. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), indicating high severity due to its network accessibility, low attack complexity, and lack of prerequisites.
Unauthenticated attackers can exploit this vulnerability remotely without privileges or user interaction. By submitting malicious payloads via the 'description' parameter, they can store scripts on affected WordPress sites, which then execute in the context of any user's browser upon accessing the injected page. This enables potential theft of session cookies, keystroke logging, or phishing attacks against site visitors, including administrators, with impacts on confidentiality and integrity.
Advisories and references, including a Wordfence threat intelligence report and code excerpts from the plugin's Trac repository (e.g., error-log.php and view-logs.php in version 3.31.4), highlight the vulnerable code paths but do not specify patch details in the provided information. Security practitioners should review these sources for mitigation guidance, such as updating to a patched version beyond 3.32.3.
Details
- CWE(s)