CVE-2026-1845 Overview
The Real Estate Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via admin settings in all versions up to, and including, 1.0.9. This vulnerability stems from insufficient input sanitization and output escaping in the plugin's administrative interface.
Authenticated attackers with administrator-level permissions or above can inject arbitrary web scripts into pages that execute whenever any user accesses the injected page. This vulnerability specifically affects WordPress multi-site installations and single-site installations where unfiltered_html capability has been disabled.
Critical Impact
Authenticated administrators can inject persistent malicious scripts that execute in the context of other users' sessions, potentially leading to session hijacking, credential theft, or further compromise of the WordPress installation.
Affected Products
- Real Estate Pro WordPress Plugin versions up to and including 1.0.9
- WordPress Multi-site Installations with Real Estate Pro
- WordPress Installations with unfiltered_html disabled running Real Estate Pro
Discovery Timeline
- 2026-04-22 - CVE CVE-2026-1845 published to NVD
- 2026-04-22 - Last updated in NVD database
Technical Details for CVE-2026-1845
Vulnerability Analysis
This Stored Cross-Site Scripting vulnerability (CWE-79) exists due to the Real Estate Pro plugin's failure to properly sanitize user input and escape output within its administrative settings interface. When an administrator saves configuration values containing malicious JavaScript code, the plugin stores this payload without proper sanitization. Subsequently, when any user views a page that renders these settings, the malicious script executes within their browser context.
The attack requires network access and high privileges (administrator-level), but does not require user interaction for the injected scripts to execute. The vulnerability has a changed scope, meaning the impact extends beyond the vulnerable component itself—malicious scripts can affect other users viewing the affected pages.
Root Cause
The root cause lies in insufficient input validation and output encoding within the plugin's settings handling mechanism. The Real Estate Pro plugin fails to implement proper sanitization functions such as sanitize_text_field() or wp_kses() when processing administrator input, and neglects to use escaping functions like esc_html() or esc_attr() when rendering the stored values.
This creates a classic Stored XSS condition where malicious payloads persist in the WordPress database and execute each time the affected content is rendered.
Attack Vector
The attack vector is network-based, requiring an authenticated attacker with administrator privileges to access the WordPress admin panel. The attacker navigates to the Real Estate Pro plugin settings, identifies input fields that lack proper sanitization, and injects JavaScript payloads within configuration values.
Once the malicious settings are saved, any user who subsequently accesses a page that renders these stored values will have the injected script execute in their browser. This can include other administrators, editors, or even front-end visitors if the settings values are displayed publicly.
The vulnerability specifically manifests in WordPress multi-site environments or installations where unfiltered_html has been disabled, as these configurations prevent the expected administrative HTML filtering that would otherwise strip malicious scripts.
Detection Methods for CVE-2026-1845
Indicators of Compromise
- Unexpected JavaScript code within Real Estate Pro plugin settings stored in the WordPress wp_options table
- Suspicious <script> tags, event handlers (e.g., onerror, onload), or encoded payloads in plugin configuration values
- Browser developer console errors or unusual network requests when viewing Real Estate Pro-enabled pages
- Unauthorized data exfiltration attempts or cookie theft detected in network logs
Detection Strategies
- Review Real Estate Pro plugin settings for unexpected HTML or JavaScript content using database queries against wp_options
- Implement Content Security Policy (CSP) headers to detect and block inline script execution attempts
- Monitor WordPress admin activity logs for unusual settings modifications to the Real Estate Pro plugin
- Deploy web application firewall (WAF) rules to detect XSS payloads in HTTP POST requests to plugin settings pages
Monitoring Recommendations
- Enable WordPress audit logging to track all administrative changes to plugin settings
- Configure browser-based XSS auditor alerts for administrative users
- Implement server-side log monitoring for suspicious JavaScript patterns in database write operations
- Use SentinelOne Singularity to monitor endpoint behavior for indicators of script injection or credential harvesting activities
How to Mitigate CVE-2026-1845
Immediate Actions Required
- Update the Real Estate Pro plugin to a patched version when available from the vendor
- Review all existing Real Estate Pro plugin settings for unauthorized or suspicious JavaScript content
- Temporarily restrict administrator access to trusted users only until the plugin is updated
- Consider disabling the Real Estate Pro plugin if it is not critical to operations until a security patch is released
Patch Information
Currently, monitor the WordPress Plugin Directory for updated versions of the Real Estate Pro plugin that address this vulnerability. Additionally, review the Wordfence Vulnerability Report for vendor patch status and additional guidance.
Workarounds
- Limit administrator access to the WordPress installation to reduce the attack surface
- Implement strict Content Security Policy headers to mitigate the impact of any injected scripts
- Use a WordPress security plugin with XSS filtering capabilities to provide an additional layer of protection
- Regularly audit plugin settings and database entries for suspicious content
# Review Real Estate Pro settings in WordPress database for suspicious content
wp db query "SELECT option_name, option_value FROM wp_options WHERE option_name LIKE '%re_pro%' OR option_name LIKE '%real_estate%';"
# Implement basic CSP header in .htaccess (Apache)
# Add to WordPress root .htaccess file:
# Header set Content-Security-Policy "script-src 'self'; object-src 'none';"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

