The DukaPress WordPress plugin through 3.2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 11 Mar 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The DukaPress WordPress plugin through 3.2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | |
| Title | DukaPress <= 3.2.4 - Reflected XSS | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-03-11T06:00:10.465Z
Reserved: 2026-02-13T13:35:41.123Z
Link: CVE-2026-2466
No data.
Status : Received
Published: 2026-03-11T06:17:14.240
Modified: 2026-03-11T06:17:14.240
Link: CVE-2026-2466
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.