Prismatic Plugin Flaw Exposes WordPress Sites to XSS Attacks
The National Vulnerability Database (NVD) has highlighted a critical stored Cross-Site Scripting (XSS) vulnerability affecting the Prismatic plugin for WordPress. All versions up to and including 3.7.3 are susceptible to this flaw, which stems from inadequate input sanitization and output escaping within the ‘prismatic_decode’ function.
Attackers can exploit this by embedding malicious scripts into comments using a specially crafted ‘prismatic_encoded’ pseudo-shortcode. When an unsuspecting user views a page containing such a comment, the injected script executes, potentially leading to session hijacking, data theft, or further compromise. The NVD has assigned this vulnerability a CVSS score of 7.2, categorizing it as HIGH severity. The vulnerability is identified as CWE-79, a common type of XSS flaw.
What This Means For You
- If your environment is affected by CWE-79, patch immediately and audit logs for signs of exploitation. Monitor vendor advisories for CVE-2026-3876 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-3876 - WordPress Prismatic Plugin Stored XSS via Pseudo-Shortcode
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-3876 | XSS | WordPress Prismatic plugin versions <= 3.7.3 |
| CVE-2026-3876 | XSS | Vulnerable component: 'prismatic_encoded' pseudo-shortcode |
| CVE-2026-3876 | XSS | Vulnerable function: 'prismatic_decode' |
| CVE-2026-3876 | XSS | Attack vector: Submitting a comment with crafted 'prismatic_encoded' pseudo-shortcode |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 16, 2026 at 10:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.