Atomic Edge analysis of CVE-2026-2431 (metadata-based):
This vulnerability is a reflected cross-site scripting (XSS) flaw in the CM Custom Reports WordPress plugin. The root cause is insufficient input sanitization and output escaping for the ‘date_from’ and ‘date_to’ parameters. The CWE-79 classification confirms improper neutralization of input during web page generation. The vulnerability exists in all versions up to and including 1.2.7. The patched version is 1.2.8.
Atomic Edge research infers the attack vector is a WordPress admin page or AJAX endpoint that processes report filtering. The plugin likely includes a feature for generating custom reports with date range filters. These parameters are echoed back to the user’s browser without proper escaping. The CVSS vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) confirms network accessibility, low attack complexity, no privileges required, and user interaction with scope change. This indicates the attack targets a public or admin-accessible endpoint, not a strictly authenticated one.
Exploitation requires an attacker to trick a user into clicking a malicious link containing crafted ‘date_from’ or ‘date_to’ parameters. The injected script executes in the victim’s browser within the context of the vulnerable WordPress page. The impact includes session hijacking, admin actions on behalf of the user, or defacement. The fix in version 1.2.8 likely involves implementing proper input validation using `sanitize_text_field()` and output escaping with `esc_attr()` or `esc_html()` before echoing the parameters.







