WordPress Security Bulletin: Yoast SEO – Advanced SEO with real-time guidance and built-in AI Plugin Vulnerability (CVE-2026-1293)

Security Alert Summary

The Yoast SEO – Advanced SEO with real-time guidance and built-in AI plugin for WordPress is affected by a stored Cross-Site Scripting (XSS) vulnerability in the yoast-schema block attribute. Authenticated users with Contributor-level access or higher can inject scripts into pages that will execute when those pages are viewed, due to insufficient input sanitization and output escaping.

CVE Details

  • CVE ID: CVE-2026-1293
  • Affected plugin / component: Yoast SEO – Advanced SEO with real-time guidance and built-in AI (plugin for WordPress)
  • Affected versions: All versions up to, and including, 26.8
  • Published: February 6, 2026 12:16 PM
  • Last modified: February 6, 2026 3:14 PM
  • CVSS v3.1: Base Score 6.4 (MEDIUM); Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
  • Authentication / privileges / user interaction: Privileges Required: LOW (authenticated user such as Contributor); User Interaction: NONE
  • Primary impact: Confidentiality: LOW; Integrity: LOW; Availability: NONE
  • CWE: CWE-79 (Cross-site Scripting)

Technical Details

The vulnerability is a stored Cross-Site Scripting issue stemming from insufficient input sanitization and output escaping of the yoast-schema block attribute. When an authenticated user with Contributor-level access or higher saves crafted content containing malicious script payloads in this attribute, the payload is stored and later rendered in page output.

Code references related to the plugin’s schema handling are provided in the reported entry, including inc/class-wpseo-utils.php, src/generators/schema-generator.php, and src/presenters/schema-presenter.php, indicating the problem lies in how schema-related attributes are processed and presented. The stored nature of this XSS means scripts execute in the context of any user who views the injected page.

The impact is limited to what XSS typically enables: script execution in the victim’s browser context. This can be used to modify client-side page behavior, steal session information visible to the browser, or perform actions available to the affected user in their browser context. The CVSS metrics indicate confidentiality and integrity impacts are low and there is no direct availability impact.

How This Could Impact Your Website

Consider a small site with several content contributors, editors, and an external contractor who helps with content updates. A contributor (or higher) could inadvertently or intentionally add a malicious value to the yoast-schema attribute in a post or page. When editors, administrators, or other site users view that page in the front-end or certain backend previews, the injected script could run in their browsers.

Practical consequences include exposure of data available to the user’s browser (for example, cookies or locally visible session tokens), altered page content or behavior, and an increased risk of targeted phishing or social engineering that leverages information visible to authenticated users. System-wide compromise or denial of service is not indicated by the reported impact.

If you’re unsure whether your site is affected or how to assess your current user roles and plugins, it may be worth having a professional review.

Recommended Actions

  • Update the affected plugin as soon as a patched version is available.
  • Review and reduce unnecessary user roles, especially contributors and other accounts that can create or edit content.
  • Enforce strong passwords and two-factor authentication for editors and administrators.
  • Remove unused or unmaintained plugins from your site.
  • Monitor site activity and page content for unusual changes or unexpected script content.

If you’d like help reviewing your plugins, user roles, or overall WordPress security posture, our team at Freshy is happy to help.


References