CVE-2026-6646 — Cross-Site Scripting (XSS)

CVE-2026-6646 — Cross-Site Scripting (XSS)

CVE-2026-6646 — The The7 theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'dt_default_button' shortcode in all versions up to, and including, 14.3.2. This is due to insufficient input sanitization and output escaping on the 'title' component of the 'link' shortcode parameter.

What This Means For You

  • If your environment is affected by CWE-79, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-6646 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-6646 - Stored XSS in The7 Theme Button Shortcode

Sigma YAML — free preview
title: CVE-2026-6646 - Stored XSS in The7 Theme Button Shortcode
id: scw-2026-05-15-ai-1
status: experimental
level: high
description: |
  Detects the specific Stored Cross-Site Scripting (XSS) vulnerability in The7 WordPress theme (CVE-2026-6646). This rule looks for the 'dt_default_button' shortcode within the URI query string, specifically when the 'title' or 'link' parameters contain script tags, indicating a potential injection attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-6646/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
          - 'dt_default_button'
      cs-uri-query|contains:
          - 'title='
      cs-uri-query|contains:
          - 'link='
      cs-uri-query|contains:
          - '<script>'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6646 vulnerability CVE-2026-6646
CWE-79 weakness CWE-79
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 15, 2026 at 10:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-4094: WooCommerce Currency Switcher Plugin Vulnerable to Data Loss

CVE-2026-4094 — The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check...

vulnerabilityCVEhigh-severitycwe-862
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 3 Sigma

VMware Fusion TOCTOU Flaw Grants Root Privileges

CVE-2026-41702 — VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during an operation performed by a SETUID binary. A malicious actor with local non-administrative user...

vulnerabilityCVEhigh-severitycwe-367
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 3 IOCs /⚙ 2 Sigma

Musetheque V4 CSRF Vulnerability (CVE-2026-28761) Poses High Risk

CVE-2026-28761 — Cross-site request forgery vulnerability exists in Musetheque V4 Information Disclosure for IPKNOWLEDGE V4L1 rev2203.0 and earlier. If a user views a malicious page...

vulnerabilityCVEhigh-severityinformation-disclosurecwe-352
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 1 IOC /⚙ 2 Sigma