CVE-2026-1755Cross-site Scripting in Menu Icons BY Themeisle

Severity
6.4MEDIUMNVD
EPSS
0.0%
top 87.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 3
Latest updateFeb 4

Description

The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_wp_attachment_image_alt’ post meta in all versions up to, and including, 0.13.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:NExploitability: 3.1 | Impact: 2.7

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-chp8-x4w6-9g23: The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_wp_attachment_image_alt’ post meta in all vers2026-02-04
CVEList
Menu Icons by ThemeIsle <= 0.13.20 - Authenticated (Author+) Stored Cross-Site Scripting2026-02-03

🕵️Threat Intelligence

1
Wiz
CVE-2026-1755 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-1755 — Cross-site Scripting | cvebase