Description
The Mitfahrgelegenheit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘date’ parameter in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-09-11
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that allows authenticated users to inject and execute arbitrary scripts
Action: Apply Patch
AI Analysis

Impact

Mitfahrgelegenheit is a WordPress plugin that has a stored cross‑site scripting flaw in the ‘date’ parameter. Data written to this field is saved without sufficient sanitization or escaping, enabling an attacker who can create or edit an entry to submit arbitrary JavaScript. When a visitor later loads a page that contains the injected content, the script runs in the visitor’s browser. The flaw is categorized as CWE‑79.

Affected Systems

All installations of the Mitfahrgelegenheit WordPress plugin with a version of 1.1.5 or earlier are vulnerable. The vulnerability exists regardless of where the plugin is used on a site; any page that displays data stored through the ‘date’ field is affected.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. The EPSS score of less than 1% suggests that exploitation is currently unlikely. The flaw is not listed in the CISA KEV catalog, indicating that no publicly disclosed exploitation has occurred. Attackers must be authenticated with Contributor level or higher in order to submit data that triggers the flaw; once the malicious content is stored, it persists until a site administrator removes or sanitizes it, creating a long‑term threat to any user who views the affected page.

Generated by OpenCVE AI on April 22, 2026 at 00:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest Mitfahrgelegenheit plugin release that removes the vulnerable ‘date’ parameter handling; if no update is immediately available, contact the plugin developer for a fix.
  • If an update cannot be applied, prevent Contributors and higher roles from creating or editing entries that include the ‘date’ field, or disable the date field via the plugin’s configuration or custom code to stop new payloads.
  • Review existing content for injected JavaScript and either delete or sanitize the affected entries, ensuring that all stored data displayed on the site is properly escaped to prevent future script execution.

Generated by OpenCVE AI on April 22, 2026 at 00:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27651 The Mitfahrgelegenheit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘date’ parameter in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 12 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Mitfahrgelegenheit
Mitfahrgelegenheit mitfahrgelegenheit Plugin
Wordpress
Wordpress wordpress
Vendors & Products Mitfahrgelegenheit
Mitfahrgelegenheit mitfahrgelegenheit Plugin
Wordpress
Wordpress wordpress

Thu, 11 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 07:30:00 +0000

Type Values Removed Values Added
Description The Mitfahrgelegenheit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘date’ parameter in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Mitfahrgelegenheit <= 1.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via date Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Mitfahrgelegenheit Mitfahrgelegenheit Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:29.545Z

Reserved: 2025-07-30T19:52:15.500Z

Link: CVE-2025-8392

cve-icon Vulnrichment

Updated: 2025-09-11T13:45:31.658Z

cve-icon NVD

Status : Deferred

Published: 2025-09-11T08:15:33.290

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8392

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:00:04Z

Weaknesses