Description
The My Calendar – Accessible Event Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template` attribute of the `[my_calendar_upcoming]` shortcode in all versions up to, and including, 3.7.3. This is due to the use of `stripcslashes()` on user-supplied shortcode attribute values in the `mc_draw_template()` function, which decodes C-style hex escape sequences (e.g., `\x3c` to `<`) at render time, bypassing WordPress's `wp_kses_post()` content sanitization that runs at save time. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-03-04
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The My Calendar – Accessible Event Manager plugin for WordPress is vulnerable to stored cross‑site scripting through the template attribute of the [my_calendar_upcoming] shortcode. The flaw arises because user‑supplied attribute values are processed with stripcslashes, which decodes C‑style escape sequences before WordPress’s content sanitization runs, allowing attackers to store arbitrary JavaScript that executes when a page containing the shortcode is viewed.

Affected Systems

All versions of the My Calendar – Accessible Event Manager plugin up to and including 3.7.3 running on WordPress sites are impacted. The vulnerability is present in the mc_draw_template() function handling the template attribute of the [my_calendar_upcoming] shortcode. Contributor‑level or higher authenticated users on affected installations can exploit it.

Risk and Exploitability

The CVSS score is 6.4, indicating moderate severity, but the EPSS score is below 1 %, suggesting low likelihood of exploit. The vulnerability is not listed in the CISA KEV catalog. Attackers need only an authenticated Contributor or higher role and use of the shortcode with a crafted template value; the injected script runs for any visitor who loads the affected page. Consequently, the risk is moderate but exploit probability remains low.

Generated by OpenCVE AI on April 15, 2026 at 20:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the plugin to version 3.7.4 or later where the issue is fixed.
  • If an immediate update is not feasible, remove or modify any use of the template attribute in existing shortcodes, or restrict it to safe default values so that no untrusted input can be stored.
  • As an interim workaround, ensure that all content rendered by the plugin is passed through wp_kses_post() or another sanitization routine that strips script tags and escapes special characters before storing.

Generated by OpenCVE AI on April 15, 2026 at 20:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Joedolson
Joedolson my Calendar – Accessible Event Manager
Wordpress
Wordpress wordpress
Vendors & Products Joedolson
Joedolson my Calendar – Accessible Event Manager
Wordpress
Wordpress wordpress

Wed, 04 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description The My Calendar – Accessible Event Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template` attribute of the `[my_calendar_upcoming]` shortcode in all versions up to, and including, 3.7.3. This is due to the use of `stripcslashes()` on user-supplied shortcode attribute values in the `mc_draw_template()` function, which decodes C-style hex escape sequences (e.g., `\x3c` to `<`) at render time, bypassing WordPress's `wp_kses_post()` content sanitization that runs at save time. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title My Calendar – Accessible Event Manager <= 3.7.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Joedolson My Calendar – Accessible Event Manager
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:33:01.860Z

Reserved: 2026-02-11T16:51:07.908Z

Link: CVE-2026-2355

cve-icon Vulnrichment

Updated: 2026-03-04T15:01:14.020Z

cve-icon NVD

Status : Deferred

Published: 2026-03-04T12:16:03.023

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-2355

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:15:13Z

Weaknesses