Back to VulnFeed / CVE-2026-5324
root@hackertop:~/vulnfeed/CVE-2026-5324#
CVE-2026-5324 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

themefusecom Brizy Plugin up to 2.8.11 on WordPress FileUpload api.php html_entity_decode cross site scripting

Brizy Plugin 19d ago Impact pending confirmation
LIFECYCLE
5.6 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in themefusecom Brizy Plugin up to 2.8.11 on WordPress (WordPress Plugin). It has been declared as problematic. Affected by this vulnerability is the function html_entity_decode of the file api.php of the component FileUpload Handler. Upgrading to version 2.7.24 eliminates this vulnerability.
Root Cause Analysis
The CWE definition for the vulnerability is CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Impact: As an impact it is known to affect integrity.

Exploit: By approaching the search of inurl:api.php it is possible to find vulnerable targets with Google Hacking.

Countermeasure: Upgrading to version 2.7.24 eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-5324 · CVSS 5.6 · Active Threat