Description
The WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘organizer_name' parameter in all versions up to, and including, 3.1.50 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-16
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The WP Event Manager plugin contains a stored cross‑site scripting vulnerability in the 'organizer_name' field. An attacker can submit arbitrary JavaScript that is saved in the database and executed in the browsers of any user who views the injected page. This flaw allows unauthenticated exploitation and can lead to client‑side code execution, cookie theft, defacement, and related attacks.

Affected Systems

WordPress sites running the WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce plugin, any version up to and including 3.1.50.

Risk and Exploitability

The CVSS score of 7.2 classifies the issue as high severity, yet the EPSS score of <1% suggests a modest likelihood of exploitation. It is not listed in CISA KEV, implying no widespread or known active exploitation. The flaw is unauthenticated and requires the attacker to supply a malicious value for organizer_name, which the application stores without proper sanitization or escaping.

Generated by OpenCVE AI on April 21, 2026 at 19:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Event Manager to version 3.1.51 or later
  • Apply input validation to the organizer_name field, e.g., sanitize_text_field or wp_kses_post before storage
  • Ensure the template that displays organizer_name uses esc_html or a similar function to escape output

Generated by OpenCVE AI on April 21, 2026 at 19:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21575 The WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘organizer_name' parameter in all versions up to, and including, 3.1.50 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 18 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Wp-eventmanager
Wp-eventmanager wp Event Manager
CPEs cpe:2.3:a:wp-eventmanager:wp_event_manager:*:*:*:*:*:wordpress:*:*
Vendors & Products Wp-eventmanager
Wp-eventmanager wp Event Manager

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00074}


Wed, 16 Jul 2025 05:45:00 +0000

Type Values Removed Values Added
Description The WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘organizer_name' parameter in all versions up to, and including, 3.1.50 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WP Event Manager <= 3.1.50 - Unauthenticated Stored Cross-Site Scripting via 'organizer_name'
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wp-eventmanager Wp Event Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:04:59.917Z

Reserved: 2025-03-25T20:08:40.951Z

Link: CVE-2025-2800

cve-icon Vulnrichment

Updated: 2025-07-18T14:47:38.614Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-16T06:15:24.847

Modified: 2025-07-16T19:56:53.037

Link: CVE-2025-2800

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T19:45:16Z

Weaknesses