CVE-2026-1841

7.2 HIGH

📋 TL;DR

The PixelYourSite WordPress plugin is vulnerable to stored cross-site scripting (XSS) via insufficient input sanitization in the 'pysTrafficSource' and 'pys_landing_page' parameters. This allows unauthenticated attackers to inject malicious scripts that execute when users visit compromised pages. All WordPress sites using this plugin up to version 11.2.0 are affected.

💻 Affected Systems

Products:
  • PixelYourSite – Your smart PIXEL (TAG) & API Manager WordPress plugin
Versions: All versions up to and including 11.2.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users.

🟠

Likely Case

Attackers inject malicious scripts to steal user data, session tokens, or redirect users to phishing sites.

🟢

If Mitigated

With proper input validation and output escaping, the vulnerability would be prevented, and impact would be minimal.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and involves simple script injection via URL parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3454364/pixelyoursite

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find PixelYourSite plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 11.2.1+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the PixelYourSite plugin until patched.

wp plugin deactivate pixelyoursite

Web Application Firewall (WAF) rule

all

Block requests containing suspicious script patterns in pysTrafficSource and pys_landing_page parameters.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution.
  • Monitor web server logs for unusual parameter values and block malicious IPs.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for PixelYourSite version. If version is 11.2.0 or lower, it is vulnerable.

Check Version:

wp plugin get pixelyoursite --field=version

Verify Fix Applied:

After update, confirm plugin version is 11.2.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long strings or script tags in pysTrafficSource or pys_landing_page parameters in web server logs.

Network Indicators:

  • HTTP requests with suspicious script payloads in URL parameters.

SIEM Query:

source="web_server_logs" AND (pysTrafficSource="*<script*" OR pys_landing_page="*<script*")

🔗 References

📤 Share & Export