CVE-2026-1379
HTTP Headers <= 1.19.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'Custom Headers' Plugin Setting
CVSS Score
4.4
EPSS Score
0.0%
EPSS Percentile
0th
The HTTP Headers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.19.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
| CWE | CWE-79 |
| Vendor | zinoui |
| Product | http headers |
| Published | Apr 22, 2026 |
Stay Ahead of the Next One
Get instant alerts for zinoui http headers
Be the first to know when new medium vulnerabilities affecting zinoui http headers are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
zinoui / HTTP Headers
0 โค 1.19.2
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/02e63068-02a8-4106-b64e-430c24815e55?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/http-headers/trunk/views/manual.php#L18 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/http-headers/tags/1.19.2/views/manual.php#L18
Credits
Daniel Basta