February 2026 brought a sharp reminder that the plugins sitting quietly inside millions of WordPress websites are not always as safe as they appear. Security researchers confirmed active vulnerabilities in several of the most widely installed plugins on the internet — tools that many business owners will recognise immediately, and that a significant number will have installed on their own sites right now. If you have not checked your WordPress dashboard for pending updates recently, this is the moment to do so.
Three plugins in particular deserve your attention. Yoast SEO, installed on more than 10 million websites, was found to contain a Cross Site Scripting vulnerability (CVE-2026-1293) affecting all versions below 26.9. A patch was released in version 26.9. Yoast Duplicate Post, installed on more than 4 million websites, carried a separate Cross Site Scripting vulnerability (CVE-2019-25314) in versions below 3.2.4, also now patched. Essential Addons for Elementor, used on more than 2 million websites, was affected by multiple Cross Site Scripting vulnerabilities across several versions, each requiring contributor-level access or above to exploit. In every case, the fix exists. The risk for sites running outdated versions, however, remains entirely real.
What a Cross Site Scripting vulnerability actually means for your business
Cross Site Scripting — commonly abbreviated to XSS — is a type of attack in which malicious code is injected into a webpage and then executed in the browser of anyone who visits it. From a business perspective, the consequences are not abstract. Depending on how the vulnerability is exploited, an attacker could steal session data from logged-in users, redirect visitors to fraudulent websites, display content that damages your brand, or silently harvest information from people who trust your site. Customers who encounter a compromised page rarely stop to investigate the cause. They simply leave — and often do not return.
The fact that these vulnerabilities exist in tools specifically associated with SEO and page building compounds the concern. Yoast SEO is almost ubiquitous across professional WordPress sites. Many businesses installed it years ago and have not thought about it since, beyond occasionally glancing at the green traffic lights on their content editor. That familiarity can breed complacency, and complacency is precisely what attackers rely on.
It is also worth understanding what the scale of these install counts means in practice. When a vulnerability is publicly disclosed in a plugin installed on 10 million websites, it does not take long for automated scanning tools to start probing those sites. Automated attacks targeting known software vulnerabilities are identified as one of the leading causes of website compromises. These are not targeted operations carried out by individuals with a specific interest in your business. They are bulk, opportunistic scans that sweep across the internet looking for unpatched installations. The larger the install base, the more attractive the target pool. Your site does not have to be high-profile to be caught in that net.
Why unpatched plugins remain one of the most avoidable causes of compromise
There is an important distinction between a vulnerability being discovered and a vulnerability being exploited on your specific site. Once a patch is released, that window closes for anyone who applies the update promptly. The sites that remain at risk are those where the update has not been applied — which, in practice, often means sites where no one is actively monitoring for them.
This is not a criticism. Many business owners and entrepreneurs are running WordPress sites without a technical background, relying on tools that mostly work without much intervention. The problem is that “mostly working” and “secure” are not the same thing. WordPress core, themes, and plugins all require regular updates, and those updates frequently contain security fixes rather than just new features. Skipping them because the site appears to be functioning normally is one of the most common ways a business website ends up compromised.
For the three plugins identified this month, the remediation is straightforward:
- Update Yoast SEO to version 26.9 or above.
- Update Yoast Duplicate Post to version 3.2.4 or above.
- Update Essential Addons for Elementor to the latest available patched version.
If you are not sure which versions you are currently running, log in to your WordPress dashboard, go to Plugins > Installed Plugins, and check the version numbers against the figures above. If updates are available, apply them. If you are running a managed hosting environment that handles updates automatically, confirm with your host that these specific plugins have been updated.
Beyond this immediate action, the broader question is whether you have a reliable process for keeping your site maintained. Checking for updates once a quarter is not sufficient. Vulnerabilities are disclosed continuously, patches are released on no fixed schedule, and the automated tools that exploit known weaknesses do not pause whilst you are busy with other priorities. A disciplined update process — applied consistently and with proper backups in place before changes are made — is the difference between a site that stays secure and one that becomes a statistic.
If that process is not currently in place for your website, or if you are not confident that updates are being applied correctly and safely, I can help. Maintaining WordPress sites for business owners who would rather focus on running their businesses is a core part of what I do at The WordPress Guy. Get in touch and I will give you a straight assessment of where your site stands and what it would take to keep it properly maintained going forward.










