CVE-2026-1841
📋 TL;DR
The PixelYourSite WordPress plugin is vulnerable to stored cross-site scripting (XSS) via insufficient input sanitization in the 'pysTrafficSource' and 'pys_landing_page' parameters. This allows unauthenticated attackers to inject malicious scripts that execute when users visit compromised pages. All WordPress sites using this plugin up to version 11.2.0 are affected.
💻 Affected Systems
- PixelYourSite – Your smart PIXEL (TAG) & API Manager WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users.
Likely Case
Attackers inject malicious scripts to steal user data, session tokens, or redirect users to phishing sites.
If Mitigated
With proper input validation and output escaping, the vulnerability would be prevented, and impact would be minimal.
🎯 Exploit Status
Exploitation requires no authentication and involves simple script injection via URL parameters.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.2.1 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3454364/pixelyoursite
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find PixelYourSite plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 11.2.1+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the PixelYourSite plugin until patched.
wp plugin deactivate pixelyoursite
Web Application Firewall (WAF) rule
allBlock requests containing suspicious script patterns in pysTrafficSource and pys_landing_page parameters.
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to limit script execution.
- Monitor web server logs for unusual parameter values and block malicious IPs.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for PixelYourSite version. If version is 11.2.0 or lower, it is vulnerable.
Check Version:
wp plugin get pixelyoursite --field=version
Verify Fix Applied:
After update, confirm plugin version is 11.2.1 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual long strings or script tags in pysTrafficSource or pys_landing_page parameters in web server logs.
Network Indicators:
- HTTP requests with suspicious script payloads in URL parameters.
SIEM Query:
source="web_server_logs" AND (pysTrafficSource="*<script*" OR pys_landing_page="*<script*")
🔗 References
- https://plugins.trac.wordpress.org/browser/pixelyoursite/tags/11.1.5.2/includes/enrich/class_enrich_order.php#L252
- https://plugins.trac.wordpress.org/browser/pixelyoursite/tags/11.1.5.2/includes/enrich/class_enrich_order.php#L255
- https://plugins.trac.wordpress.org/browser/pixelyoursite/tags/11.1.5.2/includes/enrich/class_enrich_order.php#L265
- https://plugins.trac.wordpress.org/browser/pixelyoursite/tags/11.1.5.2/includes/enrich/class_enrich_order.php#L266
- https://plugins.trac.wordpress.org/changeset/3454364/pixelyoursite
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4c4f2d9d-d34c-45dd-aff8-ca9bbe808b5a?source=cve