CVE-2026-4083 (GCVE-0-2026-4083)
Vulnerability from cvelistv5 – Published: 2026-03-20 23:25 – Updated: 2026-04-08 16:53
VLAI?
Title
Scoreboard for HTML5 Games Lite <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes
Summary
The Scoreboard for HTML5 Games Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'scoreboard' shortcode in all versions up to, and including, 1.2. The shortcode function sfhg_shortcode() allows arbitrary HTML attributes to be added to the rendered <iframe> element, with only a small blacklist of four attribute names (same_height_as, onload, onpageshow, onclick) being blocked. While the attribute names are passed through esc_html() and values through esc_attr(), this does not prevent injection of JavaScript event handler attributes like onfocus, onmouseover, onmouseenter, etc., because these attribute names and simple JavaScript payloads contain no characters that would be modified by these escaping functions. The shortcode text is stored in post_content and is only expanded to HTML at render time, after WordPress's kses filtering has already been applied to the raw post content. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity ?
6.4 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| demonisblack | Scoreboard for HTML5 Games Lite |
Affected:
0 , ≤ 1.2
(semver)
|
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-4083",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-24T15:23:59.700824Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-24T15:24:22.345Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Scoreboard for HTML5 Games Lite",
"vendor": "demonisblack",
"versions": [
{
"lessThanOrEqual": "1.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Muhammad Yudha - DJ"
}
],
"descriptions": [
{
"lang": "en",
"value": "The Scoreboard for HTML5 Games Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u0027scoreboard\u0027 shortcode in all versions up to, and including, 1.2. The shortcode function sfhg_shortcode() allows arbitrary HTML attributes to be added to the rendered \u003ciframe\u003e element, with only a small blacklist of four attribute names (same_height_as, onload, onpageshow, onclick) being blocked. While the attribute names are passed through esc_html() and values through esc_attr(), this does not prevent injection of JavaScript event handler attributes like onfocus, onmouseover, onmouseenter, etc., because these attribute names and simple JavaScript payloads contain no characters that would be modified by these escaping functions. The shortcode text is stored in post_content and is only expanded to HTML at render time, after WordPress\u0027s kses filtering has already been applied to the raw post content. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-08T16:53:26.189Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/550ae348-254e-49f5-8046-38629c774802?source=cve"
},
{
"url": "https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L274"
},
{
"url": "https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L320"
},
{
"url": "https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L320"
},
{
"url": "https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L274"
},
{
"url": "https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L317"
},
{
"url": "https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L317"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=3483176%40scoreboard-for-html5-game-lite\u0026new=3483176%40scoreboard-for-html5-game-lite\u0026sfp_email=\u0026sfph_mail="
}
],
"timeline": [
{
"lang": "en",
"time": "2026-03-20T11:20:53.000Z",
"value": "Disclosed"
}
],
"title": "Scoreboard for HTML5 Games Lite \u003c= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes"
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2026-4083",
"datePublished": "2026-03-20T23:25:11.485Z",
"dateReserved": "2026-03-12T20:47:57.751Z",
"dateUpdated": "2026-04-08T16:53:26.189Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-4083",
"date": "2026-05-05",
"epss": "0.00054",
"percentile": "0.16592"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-4083\",\"sourceIdentifier\":\"security@wordfence.com\",\"published\":\"2026-03-21T00:16:29.220\",\"lastModified\":\"2026-04-22T21:32:08.360\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Scoreboard for HTML5 Games Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u0027scoreboard\u0027 shortcode in all versions up to, and including, 1.2. The shortcode function sfhg_shortcode() allows arbitrary HTML attributes to be added to the rendered \u003ciframe\u003e element, with only a small blacklist of four attribute names (same_height_as, onload, onpageshow, onclick) being blocked. While the attribute names are passed through esc_html() and values through esc_attr(), this does not prevent injection of JavaScript event handler attributes like onfocus, onmouseover, onmouseenter, etc., because these attribute names and simple JavaScript payloads contain no characters that would be modified by these escaping functions. The shortcode text is stored in post_content and is only expanded to HTML at render time, after WordPress\u0027s kses filtering has already been applied to the raw post content. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\"},{\"lang\":\"es\",\"value\":\"El plugin Scoreboard for HTML5 Games Lite para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s del shortcode \u0027scoreboard\u0027 en todas las versiones hasta la 1.2, inclusive. La funci\u00f3n de shortcode sfhg_shortcode() permite que se a\u00f1adan atributos HTML arbitrarios al elemento renderizado, con solo una peque\u00f1a lista negra de cuatro nombres de atributos (same_height_as, onload, onpageshow, onclick) bloqueados. Si bien los nombres de los atributos se pasan a trav\u00e9s de esc_html() y los valores a trav\u00e9s de esc_attr(), esto no evita la inyecci\u00f3n de atributos de gestor de eventos JavaScript como onfocus, onmouseover, onmouseenter, etc., porque estos nombres de atributos y cargas \u00fatiles JavaScript simples no contienen caracteres que ser\u00edan modificados por estas funciones de escape. El texto del shortcode se almacena en post_content y solo se expande a HTML en el momento de la renderizaci\u00f3n, despu\u00e9s de que el filtrado kses de WordPress ya se haya aplicado al contenido sin procesar de la publicaci\u00f3n. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@wordfence.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.1,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"security@wordfence.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L274\",\"source\":\"security@wordfence.com\"},{\"url\":\"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L317\",\"source\":\"security@wordfence.com\"},{\"url\":\"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L320\",\"source\":\"security@wordfence.com\"},{\"url\":\"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L274\",\"source\":\"security@wordfence.com\"},{\"url\":\"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L317\",\"source\":\"security@wordfence.com\"},{\"url\":\"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L320\",\"source\":\"security@wordfence.com\"},{\"url\":\"https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=3483176%40scoreboard-for-html5-game-lite\u0026new=3483176%40scoreboard-for-html5-game-lite\u0026sfp_email=\u0026sfph_mail=\",\"source\":\"security@wordfence.com\"},{\"url\":\"https://www.wordfence.com/threat-intel/vulnerabilities/id/550ae348-254e-49f5-8046-38629c774802?source=cve\",\"source\":\"security@wordfence.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-4083\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-24T15:23:59.700824Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-24T15:24:08.966Z\"}}], \"cna\": {\"title\": \"Scoreboard for HTML5 Games Lite \u003c= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Muhammad Yudha - DJ\"}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 6.4, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N\"}}], \"affected\": [{\"vendor\": \"demonisblack\", \"product\": \"Scoreboard for HTML5 Games Lite\", \"versions\": [{\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.2\"}], \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-03-20T11:20:53.000Z\", \"value\": \"Disclosed\"}], \"references\": [{\"url\": \"https://www.wordfence.com/threat-intel/vulnerabilities/id/550ae348-254e-49f5-8046-38629c774802?source=cve\"}, {\"url\": \"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L274\"}, {\"url\": \"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L320\"}, {\"url\": \"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L320\"}, {\"url\": \"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L274\"}, {\"url\": \"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/trunk/scoreboard-for-html5-game-lite.php#L317\"}, {\"url\": \"https://plugins.trac.wordpress.org/browser/scoreboard-for-html5-game-lite/tags/1.2/scoreboard-for-html5-game-lite.php#L317\"}, {\"url\": \"https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=3483176%40scoreboard-for-html5-game-lite\u0026new=3483176%40scoreboard-for-html5-game-lite\u0026sfp_email=\u0026sfph_mail=\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Scoreboard for HTML5 Games Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u0027scoreboard\u0027 shortcode in all versions up to, and including, 1.2. The shortcode function sfhg_shortcode() allows arbitrary HTML attributes to be added to the rendered \u003ciframe\u003e element, with only a small blacklist of four attribute names (same_height_as, onload, onpageshow, onclick) being blocked. While the attribute names are passed through esc_html() and values through esc_attr(), this does not prevent injection of JavaScript event handler attributes like onfocus, onmouseover, onmouseenter, etc., because these attribute names and simple JavaScript payloads contain no characters that would be modified by these escaping functions. The shortcode text is stored in post_content and is only expanded to HTML at render time, after WordPress\u0027s kses filtering has already been applied to the raw post content. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"b15e7b5b-3da4-40ae-a43c-f7aa60e62599\", \"shortName\": \"Wordfence\", \"dateUpdated\": \"2026-03-20T23:25:11.485Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-4083\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-24T15:24:22.345Z\", \"dateReserved\": \"2026-03-12T20:47:57.751Z\", \"assignerOrgId\": \"b15e7b5b-3da4-40ae-a43c-f7aa60e62599\", \"datePublished\": \"2026-03-20T23:25:11.485Z\", \"assignerShortName\": \"Wordfence\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…