| Plugin Name | Robin image optimizer |
|---|---|
| Type of Vulnerability | Cross-Site Scripting (XSS) |
| CVE Number | CVE-2026-1319 |
| Urgency | Low |
| CVE Publish Date | 2026-02-04 |
| Source URL | CVE-2026-1319 |
Urgent: Stored XSS in Robin Image Optimizer (≤ 2.0.2) — What WordPress Site Owners Must Do Now
Date: 4 Feb, 2026
CVE: CVE-2026-1319
Affected: Robin Image Optimizer plugin — versions ≤ 2.0.2
Fixed in: 2.0.3
Severity: Low (Patch priority: Low) — CVSS 3.1 5.9 (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)
This advisory explains the vulnerability, who is at risk, immediate mitigation steps you can apply within 24 hours, how to detect and clean any exploitation, and development guidance to prevent recurrence. The language and recommendations below reflect practical field experience from a Hong Kong security practitioner working with multi-author editorial sites and enterprise WordPress deployments.
What happened — technical summary
- Root cause: The plugin accepted free-form input in the image alternative text (alt) field and later rendered the stored value without proper sanitization or output escaping. That allowed an authenticated user with Author-or-higher capability to store HTML/JavaScript in the alt field, producing a persistent (stored) XSS.
- Attack vector: An authenticated attacker (Author+) edits an image’s alt text and injects a payload (e.g., ,
onerror=,onclick=,onload=,onmouseover=,javascript:,data:text/html, - Alert rules to consider: any POST to media endpoints where
_wp_attachment_image_altcontains suspicious tokens; changes to alt metadata by users who normally do not edit media; creation of new admin or high-privilege accounts.
Why stored XSS in media metadata is dangerous
Image metadata such as alt text is often treated as benign. Developers and content editors can forget to escape metadata in all rendering contexts. Because the payload is stored persistently, it can trigger later when a privileged user views a page, enabling privilege escalation or full site compromise. Treat metadata as an attack surface equal to visible content.