The Ajax Load More WordPress plugin before 7.8.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 18 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 |
Mon, 18 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ajax Load More WordPress plugin before 7.8.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | |
| Title | Ajax Load More < 7.8.4 - Reflected XSS | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-05-18T06:00:09.061Z
Reserved: 2026-04-17T08:19:11.648Z
Link: CVE-2026-6495
No data.
Status : Received
Published: 2026-05-18T07:16:12.820
Modified: 2026-05-18T07:16:12.820
Link: CVE-2026-6495
No data.
OpenCVE Enrichment
Updated: 2026-05-18T07:30:20Z
Weaknesses