CVE-2026-2257

MEDIUM

GetGenie WordPress Plugin <=4.3.2 - Stored XSS

Title source: llm
STIX 2.1

Description

The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2 due to missing validation on a user controlled key in the `action` function. This makes it possible for authenticated attackers, with Author-level access and above, to update post metadata for arbitrary posts. Combined with a lack of input sanitization, this leads to Stored Cross-Site Scripting when a higher-privileged user (such as an Administrator) views the affected post's "Competitor" tab in the GetGenie sidebar.

Scores

CVSS v3 6.4
EPSS 0.0001
EPSS Percentile 1.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-639
Status published
Products (1)
roxnor/GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools < 4.3.2
Published Mar 13, 2026
Tracked Since Mar 14, 2026