Description
The Community Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ce_venue_name' parameter in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-02-18
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting via the ce_venue_name parameter allowing administrator-level users to inject arbitrary JavaScript into stored venue data
Action: Patch
AI Analysis

Impact

The Community Events plugin for WordPress is vulnerable to stored cross‑site scripting via the ce_venue_name parameter. This flaw arises from insufficient input sanitization and output escaping and allows an attacker who can authenticate with administrator‑level or higher privileges to inject arbitrary JavaScript or other web scripts into the plugin’s stored venue information. Once injected, the scripts execute whenever any user loads the affected page, thereby compromising the confidentiality, integrity, and potentially availability of the affected WordPress site.

Affected Systems

All installations of the Community Events WordPress plugin from jackdewey that run version 1.5.7 or earlier are affected. The vulnerability is present in the plugin’s core code that processes the ce_venue_name field, and there is no known fix in versions up to and including 1.5.7.

Risk and Exploitability

The CVSS score of 4.4 indicates a medium severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. However, the vulnerability requires authenticated administrators, making it an internal risk if privileged accounts are compromised or if an insider misuses the capability. Because it is not listed in the CISA KEV catalog, there is currently no known active exploitation. Attackers would exploit the flaw by submitting a malicious venue name through the event creation interface, after which the malicious payload is stored and rendered without proper escaping.

Generated by OpenCVE AI on April 15, 2026 at 17:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Community Events plugin to the latest released version that contains the vulnerability fix.
  • If an upgrade cannot be performed immediately, delete or sanitize any existing venue names that contain suspicious or unsanitized content and limit the creation rights to trusted administrators.
  • Implement input validation and output escaping for the ce_venue_name field, such as using WordPress functions esc_html() or wp_strip_all_tags() before storing or rendering the value.

Generated by OpenCVE AI on April 15, 2026 at 17:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Jackdewey
Jackdewey community Events
Wordpress
Wordpress wordpress
Vendors & Products Jackdewey
Jackdewey community Events
Wordpress
Wordpress wordpress

Wed, 18 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Community Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ce_venue_name' parameter in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Community Events <= 1.5.7 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'ce_venue_name' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Jackdewey Community Events
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:20:35.144Z

Reserved: 2026-01-29T19:05:46.724Z

Link: CVE-2026-1649

cve-icon Vulnrichment

Updated: 2026-02-18T12:24:54.172Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T09:15:58.173

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:30:10Z

Weaknesses