The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to DOM-Based Cross-Site Scripting via postMessage in all versions up to, and including, 5.0.11. This is due to the plugin's admin-shell.js registering a global message event listener without origin validation (missing event.origin check) and directly passing user-controlled URLs to window.open() without URL scheme validation. This makes it possible for unauthenticated attackers to execute arbitrary JavaScript in the context of an authenticated administrator's session by tricking them into visiting a malicious website that sends crafted postMessage payloads to the plugin's admin page.

Project Subscriptions

Vendors Products
Rebelcode Subscribe
Rss Aggregator – Rss Import, News Feeds, Feed To Post, And Autoblogging Subscribe
Wordpress Subscribe
Wordpress Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rebelcode
Rebelcode rss Aggregator – Rss Import, News Feeds, Feed To Post, And Autoblogging
Wordpress
Wordpress wordpress
Vendors & Products Rebelcode
Rebelcode rss Aggregator – Rss Import, News Feeds, Feed To Post, And Autoblogging
Wordpress
Wordpress wordpress

Sat, 07 Mar 2026 07:45:00 +0000

Type Values Removed Values Added
Description The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to DOM-Based Cross-Site Scripting via postMessage in all versions up to, and including, 5.0.11. This is due to the plugin's admin-shell.js registering a global message event listener without origin validation (missing event.origin check) and directly passing user-controlled URLs to window.open() without URL scheme validation. This makes it possible for unauthenticated attackers to execute arbitrary JavaScript in the context of an authenticated administrator's session by tricking them into visiting a malicious website that sends crafted postMessage payloads to the plugin's admin page.
Title RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging <= 5.0.11 - Unauthenticated DOM-Based Reflected Cross-Site Scripting via postMessage
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-03-09T18:28:59.710Z

Reserved: 2026-02-12T21:50:01.000Z

Link: CVE-2026-2433

cve-icon Vulnrichment

Updated: 2026-03-09T17:31:35.355Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-07T08:16:11.193

Modified: 2026-03-09T13:35:34.633

Link: CVE-2026-2433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-09T10:05:41Z

Weaknesses