Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 22 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dartiss
Dartiss draft List Wordpress Wordpress wordpress |
|
| Vendors & Products |
Dartiss
Dartiss draft List Wordpress Wordpress wordpress |
Fri, 22 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Draft List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Draft Post Title in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The unescaped injection path is triggered specifically when the viewing user lacks edit capabilities, meaning payloads embedded in draft post titles via attribute-breakout techniques execute for unauthenticated users and subscribers. | |
| Title | Draft List <= 2.6.3 - Authenticated (Author+) Stored Cross-Site Scripting via Draft Post Title | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-22T12:35:48.269Z
Reserved: 2026-05-20T17:04:18.630Z
Link: CVE-2026-9104
Updated: 2026-05-22T12:35:43.343Z
Status : Received
Published: 2026-05-22T05:16:28.290
Modified: 2026-05-22T05:16:28.290
Link: CVE-2026-9104
No data.
OpenCVE Enrichment
Updated: 2026-05-22T06:30:29Z