PT-2026-42066 · Simonholliday · Anomify Ai – Anomaly Detection/Alerting

Published

2026-05-20

·

Updated

2026-05-20

·

CVE-2026-6404

CVSS v3.1

4.4

Medium

VectorAV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
The Anomify AI – Anomaly Detection and Alerting plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'anomify api key' parameter in versions up to and including 0.3.6. This is due to insufficient input sanitization and missing output escaping: the plugin applies sanitize text field() to the Metric Data Key input before saving it via update option(), but sanitize text field() strips HTML tags without encoding double-quote characters, and the value is then echoed directly into an HTML attribute context (value="...") without esc attr(). This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts that execute whenever a user visits the plugin's settings page.

Fix

XSS

Weakness Enumeration

Related Identifiers

CVE-2026-6404

Affected Products

Anomify Ai – Anomaly Detection/Alerting