Description
The Peter's Date Countdown plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-02-05
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting that allows arbitrary script injection when a user visits a malicious URL
Action: Immediate Patch
AI Analysis

Impact

The Peter’s Date Countdown WordPress plugin contains a reflected cross‑site scripting flaw caused by an unsanitized use of the PHP variable $_SERVER['PHP_SELF']. An attacker who can entice a user to visit a specially crafted link can inject JavaScript that runs in the victim’s browser, allowing the execution of arbitrary code within the context of the site. This CWE‑79 vulnerability does not require authentication and is limited to the victim’s session, but it can be used to hijack sessions, deface pages, or launch further attacks.

Affected Systems

The vulnerability is present in all releases of the Peter’s Date Countdown plugin up to and including version 2.0.0. WordPress sites running any of those versions of the plugin are potentially exposed.

Risk and Exploitability

The CVSS score is 6.1, indicating moderate severity. The EPSS score is below 1% and the vulnerability is not listed in CISA’s KEV catalog, suggesting current exploitation likelihood is low. However, the flaw is trivially exploitable via a crafted URL, requires no authentication, and relies only on a typical user interaction (clicking a link). As such, the risk profile is moderate, with potential for abuse in phishing or social engineering scenarios.

Generated by OpenCVE AI on April 15, 2026 at 17:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Peter’s Date Countdown to the latest release (any version newer than 2.0.0) to eliminate the unsanitized input usage.
  • If upgrading is not immediately feasible, modify the plugin’s source by adding proper sanitization to the $_SERVER['PHP_SELF'] variable and apply output escaping such as wp_kses before rendering any user‑controlled data.
  • Deploy site‑wide XSS protection, for example by enabling WordPress’s built‑in XSS filtering or installing a reputable security plugin that automatically sanitizes or blocks reflected script payloads.

Generated by OpenCVE AI on April 15, 2026 at 17:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 05 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 09:30:00 +0000

Type Values Removed Values Added
Description The Peter's Date Countdown plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Peter's Date Countdown <= 2.0.0 - Reflected Cross-Site Scripting via $_SERVER['PHP_SELF']
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:06.211Z

Reserved: 2026-01-29T19:18:24.125Z

Link: CVE-2026-1654

cve-icon Vulnrichment

Updated: 2026-02-05T14:33:00.593Z

cve-icon NVD

Status : Deferred

Published: 2026-02-05T10:16:03.857

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1654

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:00:15Z

Weaknesses