Description
Cross-Site Request Forgery (CSRF) vulnerability in bhoogterp Scheduled scheduled allows Stored XSS.This issue affects Scheduled: from n/a through <= 1.0.
Published: 2025-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery issue that allows an attacker to inject malicious scripts into the plugin's data store. When a forged request is accepted, the stored script is rendered in the administrator or user interface, giving an attacker the ability to execute arbitrary code in the victim’s browser. This can lead to credential theft, session hijacking, or defacement of the site. The weakness is in the plugin’s lack of CSRF protection and failure to sanitize user input, classified as CWE‑352.

Affected Systems

The flaw exists in the WordPress plugin Scheduled, developed by bhoogterp, for all versions from the initial release up to and including version 1.0. Site administrators using any of these versions are at risk if the plugin remains active.

Risk and Exploitability

Based on the description, it is inferred that an attacker could craft a forged POST request targeting the plugin’s storage endpoint, possibly by luring an authenticated administrator to a malicious URL or exploiting an existing session. The CVSS score of 7.1 indicates high severity, while the EPSS score of less than 1 % suggests low probability of exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog. Because this is a stored XSS, once malicious content is injected it would persist and affect any future page loads rendering the content for all users with access to those pages.

Generated by OpenCVE AI on May 1, 2026 at 10:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Scheduled plugin to the latest available version that removes the CSRF weakness (currently 1.1 or later).
  • If an upgrade is not possible immediately, disable or remove the plugin to eliminate the attack surface.
  • Implement a web application firewall rule that blocks suspicious CSRF requests to the plugin's storage endpoint.
  • As an additional precaution, enforce input validation and output escaping on any data that the plugin accepts from users.

Generated by OpenCVE AI on May 1, 2026 at 10:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10647 Cross-Site Request Forgery (CSRF) vulnerability in bhoogterp Scheduled allows Stored XSS. This issue affects Scheduled: from n/a through 1.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in bhoogterp Scheduled allows Stored XSS. This issue affects Scheduled: from n/a through 1.0. Cross-Site Request Forgery (CSRF) vulnerability in bhoogterp Scheduled scheduled allows Stored XSS.This issue affects Scheduled: from n/a through <= 1.0.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 09 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in bhoogterp Scheduled allows Stored XSS. This issue affects Scheduled: from n/a through 1.0.
Title WordPress Scheduled plugin <= 1.0 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:05.285Z

Reserved: 2025-03-28T10:59:17.382Z

Link: CVE-2025-31375

cve-icon Vulnrichment

Updated: 2025-04-09T17:39:38.549Z

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:36.227

Modified: 2026-04-23T15:27:42.733

Link: CVE-2025-31375

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T11:00:15Z

Weaknesses