| Plugin Name | Easy Voice Mail |
|---|---|
| Type of Vulnerability | Cross-Site Scripting (XSS) |
| CVE Number | CVE-2026-1164 |
| Urgency | Low |
| CVE Publish Date | 2026-02-13 |
| Source URL | CVE-2026-1164 |
Urgent: CVE-2026-1164 — Stored XSS in Easy Voice Mail plugin (<= 1.2.5) — What WordPress site owners must do now
Published: 2026-02-13 | Author: Hong Kong Security Expert
A stored cross-site scripting (XSS) vulnerability affecting the Easy Voice Mail WordPress plugin (versions up to and including 1.2.5) was disclosed on 13 February 2026 (CVE-2026-1164). An unauthenticated actor can submit a crafted message payload that is stored and later rendered in the admin UI, where it can execute in an administrator’s browser. The vulnerability was reported by Kazuma Matsumoto (GMO Cybersecurity by IERAE, Inc.).
At disclosure time there was no official plugin update that fixes the vulnerability. Treat this as an urgent operational risk until a fixed version is released.
Quick summary for site owners
- A stored XSS vulnerability (CVE-2026-1164) exists in Easy Voice Mail plugin versions ≤ 1.2.5.
- An unauthenticated actor can submit a crafted message payload which is stored server-side.
- Payload execution requires a privileged user (administrator) to view the stored message — this is a stored XSS with administrative interaction required.
- CVSS reported: 5.9 (medium). Persistent XSS in admin interfaces can lead to account takeover, site defacement, or malware distribution.
- No official fixed plugin version was available at disclosure time. Immediate mitigations are necessary.
If your site uses Easy Voice Mail, act now: follow the detection and mitigation steps below. If you prefer an automated protective layer while you investigate, deploy a neutral web application firewall (WAF) or server-level filtering from your hosting provider; do not rely solely on client-side controls.
What is Stored XSS and why this one matters
Cross-site scripting occurs when an application includes untrusted input in web pages without proper sanitization or escaping. Stored (persistent) XSS is dangerous because malicious content is saved by the application and later rendered to users or administrators. In this case an unauthenticated user can submit a payload to a message field used by the Easy Voice Mail plugin; that message is stored and later displayed in the admin interface without sufficient output encoding. If an administrator opens that message, the attacker’s JavaScript runs in the context of the admin’s browser. Given admin privileges, this can be leveraged to:
- Steal authentication cookies or session tokens.
- Perform actions as the administrator via the dashboard (create users, change options).
- Install backdoors or inject malicious code.
- Pivot to other connected systems that share credentials.
Because this issue combines persistence, administrative context, and no immediate vendor patch, it should be treated as a high-priority operational risk even if the initial injection is unauthenticated.
Technical summary (what we know)
- Vulnerable component: Easy Voice Mail WordPress plugin (versions ≤ 1.2.5).
- Vulnerability type: Stored Cross-Site Scripting (XSS) via the “message” input.
- CVE assigned: CVE-2026-1164
- Discovered by: Kazuma Matsumoto (GMO Cybersecurity by IERAE, Inc.)
- Impact: Execution of attacker-supplied JavaScript in admin browsers when a stored message is viewed.
- Authentication required to trigger: Administrator must view the stored message for the script to execute.
- Attacker access for injection: Unauthenticated (attacker can submit the malicious message).
- Published: 13 Feb 2026
This is a classic case of an unauthenticated stored XSS where the attacker relies on a privileged user to trigger the payload.
Real-world exploitation scenarios
Likely attacker goals and consequences:
- Account takeover — Exfiltrate admin cookies or perform actions to create new admin users.
- Site compromise and persistence — Install backdoors, malicious plugins, or modify theme files.
- Malware distribution — Inject content that serves malware to visitors.
- Reputation and SEO damage — Add spam, phishing pages, or redirects harming traffic and rankings.
- Lateral movement — Leverage admin reuse to access hosting panels or other linked services.
Because the payload is stored on the server, any admin who opens the message viewer could trigger the attack, enabling rapid exploitation across many sites.
How to detect if your WordPress site is vulnerable or already exploited
Start with inventory and basic checks:
-
Confirm plugin presence and version
WP Admin: Plugins → Installed Plugins → check Easy Voice Mail and version. If you lack admin access, scan the file system for wp-content/plugins/easy-voice-mail and inspect the plugin header.
-
Search for suspicious stored entries
Many voice mail plugins store messages in custom tables or post types. Search the database for stored message content containing