CVE-2013-10026
WordPress vulnerability analysis and mitigation

Overview

A cross-site scripting (XSS) vulnerability was discovered in the Mail Subscribe List Plugin for WordPress, affecting versions up to 2.0.10. The vulnerability was identified in August 2014 and was assigned CVE-2013-10026. The issue exists in the processing of the file index.php, specifically related to the handling of smlname and smlemail parameters (WPScan, NVD).

Technical details

The vulnerability stems from improper sanitization and escaping of the smlname and smlemail parameters in the plugin's input processing. This security flaw is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The vulnerability has received a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).

Impact

The vulnerability allows attackers to execute stored cross-site scripting attacks. When successfully exploited, it could enable malicious actors to inject and store malicious scripts that would execute in users' browsers when viewing affected pages, potentially leading to theft of sensitive information or manipulation of web content (WPScan).

Mitigation and workarounds

The vulnerability was patched in version 2.1 of the Mail Subscribe List Plugin. The fix was implemented through commit 484970ef8285cae51d2de3bd4e4684d33c956c28, which properly sanitizes and escapes the vulnerable parameters. Users are strongly recommended to upgrade to version 2.1 or later to address this security issue (GitHub Patch).

Community reactions

The vulnerability was discovered and reported by security researcher Falcoz Kevin (aka 0pc0deFR), who received acknowledgment in the plugin's changelog for identifying and helping to fix this critical security issue (WPScan).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13604HIGH7.2
  • security-malware-firewall
NoYesDec 09, 2025
CVE-2025-13642MEDIUM5.4
  • wp-user-avatar
NoYesDec 09, 2025
CVE-2025-13924MEDIUM4.3
  • advanced-product-fields-for-woocommerce
NoYesDec 09, 2025
CVE-2025-13071N/AN/A
  • custom-admin-menu
NoNoDec 09, 2025
CVE-2025-13070N/AN/A
  • csv-to-sorttable
NoNoDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management