Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. johnbillion/query-monitor
  4. ›
  5. CVE-2026-4267

CVE-2026-4267: The Query Monitor plugin for WordPress has Reflected Cross-Site Scripting via Request URI

March 19, 2026

The Query Monitor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the $_SERVER['REQUEST_URI'] parameter in all versions up to, and including, 3.20.3 due to insufficient output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an Administrator-level user into performing an action such as clicking on a link.

On admin requests, the plugin reads user controlled data from $_SERVER['REQUEST_URI'] and stores it in the request field, then renders request, matched_query, and query_string through format_url(). If the attacker supplied string does not contain &, format_url() returns it without HTML escaping, which allows injected HTML or JavaScript from the request target to be inserted directly into the page inside a <code> element and executed in the victim’s browser.

References

  • github.com/advisories/GHSA-2xr4-chcf-vmvf
  • github.com/johnbillion/query-monitor
  • github.com/johnbillion/query-monitor/security/advisories/GHSA-2xr4-chcf-vmvf
  • nvd.nist.gov/vuln/detail/CVE-2026-4267

Code Behaviors & Features

Detect and mitigate CVE-2026-4267 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.20.4

Fixed versions

  • 3.20.4

Solution

Upgrade to version 3.20.4 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Source file

packagist/johnbillion/query-monitor/CVE-2026-4267.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 20 Mar 2026 12:19:24 +0000.