๐Ÿ” CVE Alert

CVE-2026-1985

MEDIUM 6.4

Press3D <= 1.0.2 - Authenticated (Author+) Stored Cross-Site Scripting via Link URL Parameter in 3D Model Block

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

The Press3D plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 3D Model Gutenberg block in all versions up to, and including, 1.0.2. This is due to the plugin failing to sanitize and validate the URL scheme when storing link URLs for 3D model blocks, allowing `javascript:` URLs. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages via the link URL parameter that will execute whenever a user clicks on the 3D model.

CWE CWE-79
Vendor arieslab
Product press3d
Published Feb 14, 2026
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for arieslab press3d

Be the first to know when new medium vulnerabilities affecting arieslab press3d are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

arieslab / Press3D
0 โ‰ค 1.0.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/e153bb3d-e175-48bd-894c-7ccb8f09fec4?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/press3d/trunk/press3d.php#L1 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/press3d/tags/1.0.2/press3d.php#L1 developer.wordpress.org: https://developer.wordpress.org/reference/functions/esc_url/ cwe.mitre.org: https://cwe.mitre.org/data/definitions/79.html

Credits

Athiwat Tiprasaharn Itthidej Aramsri