Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-0735
PUBLISHED
More InfoOfficial Page
Assigner-Wordfence
Assigner Org ID-b15e7b5b-3da4-40ae-a43c-f7aa60e62599
View Known Exploited Vulnerability (KEV) details
Published At-14 Feb, 2026 | 06:42
Updated At-14 Feb, 2026 | 06:42
Rejected At-
▼CVE Numbering Authority (CNA)
User Language Switch <= 1.6.10 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'tab_color_picker_language_switch' Parameter

The User Language Switch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tab_color_picker_language_switch' parameter in all versions up to, and including, 1.6.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Affected Products
Vendor
webilop
Product
User Language Switch
Default Status
unaffected
Versions
Affected
  • From * through 1.6.10 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-79CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Bhumividh Treloges
Timeline
EventDate
Disclosed2026-02-13 18:31:14
Event: Disclosed
Date: 2026-02-13 18:31:14
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.wordfence.com/threat-intel/vulnerabilities/id/c6f61e13-20fb-4cef-bae7-2cd5fa038175?source=cve
N/A
https://plugins.trac.wordpress.org/browser/user-language-switch/trunk/uls-options.php#L365
N/A
https://plugins.trac.wordpress.org/browser/user-language-switch/tags/1.6.10/uls-options.php#L365
N/A
Hyperlink: https://www.wordfence.com/threat-intel/vulnerabilities/id/c6f61e13-20fb-4cef-bae7-2cd5fa038175?source=cve
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/user-language-switch/trunk/uls-options.php#L365
Resource: N/A
Hyperlink: https://plugins.trac.wordpress.org/browser/user-language-switch/tags/1.6.10/uls-options.php#L365
Resource: N/A
Details not found