Description
The Events Listing Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Event URL' parameter in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-02-06
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Events Listing Widget plugin stores the contents of the 'Event URL' field without proper sanitization or escaping, allowing an authenticated user with Author or higher privileges to inject arbitrary JavaScript. When a page that displays the injected event is loaded by any visitor, the malicious script executes in the visitor’s browser.

Affected Systems

WordPress sites running the Events Listing Widget plugin by jackdewey, in all releases through version 1.3.4 are affected. Any installation that has not yet upgraded beyond 1.3.4 is vulnerable.

Risk and Exploitability

The base CVSS score of 6.4 indicates a moderate severity vulnerability; the EPSS score of less than 1% indicates a low probability of exploitation in the wild, and the vulnerability is currently not listed in CISA's KEV catalog. Exploitation requires the attacker to be authenticated with Author role or higher, after which they can edit an event to embed malicious code. Once injected, the script executes automatically for all users who view the event, making the attack local to the WordPress environment.

Generated by OpenCVE AI on April 15, 2026 at 21:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Events Listing Widget plugin to the latest version above 1.3.4.
  • If upgrading immediately is impractical, limit the author role’s ability to edit event URLs or temporarily disable the feature that stores URLs.
  • Implement input sanitization for all user‑supplied fields that are rendered without escaping, ensuring that any embedded script tags are removed or encoded before storage.

Generated by OpenCVE AI on April 15, 2026 at 21:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 06 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Events Listing Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Event URL' parameter in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Events Listing Widget <= 1.3.4 - Authenticated (Author+) Stored Cross-Site Scripting via Event URL Field
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:18.512Z

Reserved: 2026-01-20T19:21:01.971Z

Link: CVE-2026-1252

cve-icon Vulnrichment

Updated: 2026-02-06T17:04:50.815Z

cve-icon NVD

Status : Deferred

Published: 2026-02-06T09:15:47.880

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1252

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:30:13Z

Weaknesses