The Ivory Search – WordPress Search Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.5.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vinod-dalvi
Vinod-dalvi ivory Search – Wordpress Search Plugin Wordpress Wordpress wordpress |
|
| Vendors & Products |
Vinod-dalvi
Vinod-dalvi ivory Search – Wordpress Search Plugin Wordpress Wordpress wordpress |
Wed, 28 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ivory Search – WordPress Search Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.5.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | |
| Title | Ivory Search <= 5.5.13 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'menu_gcse' and 'nothing_found_text' Parameters | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-01-28T08:26:55.731Z
Updated: 2026-01-28T16:09:19.903Z
Reserved: 2026-01-16T16:57:13.383Z
Link: CVE-2026-1053
Updated: 2026-01-28T16:09:11.757Z
Status : Received
Published: 2026-01-28T09:15:48.980
Modified: 2026-01-28T09:15:48.980
Link: CVE-2026-1053
No data.