Atomic Edge Proof of Concept automated generator using AI diff analysis
Published : May 4, 2026

CVE-2026-1396: Magic Conversation For Gravity Forms <= 3.0.97 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (magic-conversation-for-gravity-forms)

CVE ID CVE-2026-1396
Severity Medium (CVSS 6.4)
CWE 79
Vulnerable Version 3.0.97
Patched Version
Disclosed April 6, 2026

Analysis Overview

Atomic Edge analysis of CVE-2026-1396 (metadata-based): This vulnerability affects the Magic Conversation For Gravity Forms plugin for WordPress, all versions up to and including 3.0.97. It is a Stored Cross-Site Scripting (XSS) vulnerability that allows authenticated attackers with contributor-level access or higher to inject arbitrary web scripts via the ‘magic-conversation’ shortcode attributes. The vulnerability carries a CVSS score of 6.4 (Medium Severity) with a vector of AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N.

The root cause is insufficient input sanitization and output escaping on user-supplied shortcode attributes. According to the CWE classification (CWE-79) and vulnerability description, the plugin likely processes shortcode attributes such as ‘conversation_id’, ‘height’, ‘width’, or similar parameters without properly sanitizing them with functions like sanitize_text_field() or escaping output with esc_attr() or esc_html(). Since no source code diff is available, this is inferred from the CWE and description. The plugin registers a shortcode called ‘magic-conversation’ that renders dynamic content based on attributes passed by the user. An attacker with contributor-level access or higher can create or edit posts and pages containing this shortcode with malicious attribute values.

Exploitation requires an authenticated account with contributor-level privileges or higher on a WordPress site running the vulnerable plugin version. The attacker crafts a post or page containing the ‘magic-conversation’ shortcode with a malicious attribute value. For example, the attacker could use a shortcode like [magic-conversation conversation_id=”123″ height=”100″ width=’100′ onmouseover=’alert(1)’]. When the post is saved and a user views the page, the injected JavaScript executes in the context of the victim’s browser. The attack vector is through the WordPress post/page editor (Block Editor or Classic Editor) where shortcodes are inserted. No AJAX or REST endpoint is required; the injection happens through the post content itself.

The remediation requires proper input sanitization and output escaping on all shortcode attributes. The fix should use WordPress functions such as sanitize_text_field() or shortcode_atts() with default values for validation. Additionally, output escaping with esc_attr() for HTML attribute context and esc_html() for HTML context must be applied. The patched version 3.0.98 likely implements these security measures. Based on Atomic Edge analysis, the plugin should validate attribute values against expected types (e.g., integers for numeric attributes) and strip or encode any HTML or JavaScript.

If exploited, an attacker can inject arbitrary JavaScript into any page or post where the shortcode is rendered. This script executes in the browser of any user visiting the page, including administrators. The impact includes session hijacking (theft of login cookies), unauthorized actions performed on behalf of the victim (like creating new admin accounts or installing plugins), defacement of the site, and potential malware distribution. Since WordPress contributors cannot normally execute JavaScript on the site, this vulnerability escalates contributor privileges to effectively perform XSS attacks on higher-privileged users. The CVSS confidentiality and integrity scores of LOW reflect that the attacker can access and modify small amounts of data within the scope of the vulnerable site.

Frequently Asked Questions

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet. Our AI inspection and analysis engine auto blocks threats before traditional firewall services can inspect, research and build archaic regex filters.

Get Started

Trusted by Developers & Organizations

Trusted by Developers
Blac&kMcDonaldCovenant House TorontoAlzheimer Society CanadaUniversity of TorontoHarvard Medical School