Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Optimole
Optimole optimole – Optimize Images In Real Time Wordpress Wordpress wordpress |
|
| Vendors & Products |
Optimole
Optimole optimole – Optimize Images In Real Time Wordpress Wordpress wordpress |
Sat, 11 Apr 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL paths in versions up to, and including, 4.2.3 This is due to insufficient output escaping on user-supplied URL paths in the get_current_url() function, which are inserted into JavaScript code via str_replace() without proper JavaScript context escaping in the replace_content() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
| Title | Optimole <= 4.2.3 - Reflected Cross-Site Scripting via Page Profiler URL | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-13T12:27:49.136Z
Reserved: 2026-03-31T13:15:00.960Z
Link: CVE-2026-5226
Updated: 2026-04-13T12:27:41.879Z
Status : Deferred
Published: 2026-04-11T02:16:03.120
Modified: 2026-04-24T18:00:32.033
Link: CVE-2026-5226
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:56:46Z