Description
The TimeZoneCalculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'timezonecalculator_output' shortcode in all versions up to, and including, 3.37 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-06-26
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

The TimeZoneCalculator plugin for WordPress is vulnerable to a stored cross‑site scripting flaw caused by insufficient sanitization and escaping of user‑supplied attributes on its "timezonecalculator_output" shortcode. An attacker who can authenticate with contributor‑level or higher access can inject arbitrary JavaScript into pages that, when viewed by other users, will execute in their browsers, potentially allowing data theft, session hijacking, or defacement.

Affected Systems

WordPress sites installing the TimeZoneCalculator plugin, versions up to and including 3.37, released by the vendor neoxx.

Risk and Exploitability

The flaw carries a CVSS score of 6.4, indicating moderate severity, and an EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. Exploitation requires authenticated access with at least contributor privileges, meaning an attacker must first gain legitimate credentials or elevate privileges within the WordPress installation before injecting malicious payloads.

Generated by OpenCVE AI on April 20, 2026 at 22:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the TimeZoneCalculator plugin to version 3.38 or later, which removes the vulnerable shortcode handling.
  • If an upgrade is not immediately possible, disable or remove the "timezonecalculator_output" shortcode entirely or replace it with a sanitized implementation that validates and escapes all attributes.
  • Reevaluate WordPress user roles to restrict contributor access only to trusted users, or enforce stricter permission boundaries so that contributors cannot add arbitrary attributes to plugin shortcodes.

Generated by OpenCVE AI on April 20, 2026 at 22:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28600 The TimeZoneCalculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'timezonecalculator_output' shortcode in all versions up to, and including, 3.37 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 16 Jul 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Bernhard-riedl
Bernhard-riedl timezonecalculator
CPEs cpe:2.3:a:bernhard-riedl:timezonecalculator:*:*:*:*:*:wordpress:*:*
Vendors & Products Bernhard-riedl
Bernhard-riedl timezonecalculator

Thu, 26 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Jun 2025 02:15:00 +0000

Type Values Removed Values Added
Description The TimeZoneCalculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'timezonecalculator_output' shortcode in all versions up to, and including, 3.37 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title TimeZoneCalculator <= 3.37 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Bernhard-riedl Timezonecalculator
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:31.665Z

Reserved: 2025-06-03T16:56:28.660Z

Link: CVE-2025-5559

cve-icon Vulnrichment

Updated: 2025-06-26T13:25:39.928Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-26T02:15:21.807

Modified: 2025-07-16T15:25:26.087

Link: CVE-2025-5559

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:30:19Z

Weaknesses