Description
The List View Google Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the event description in all versions up to, and including, 7.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2026-04-14
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via event descriptions
Action: Patch
AI Analysis

Impact

The List View Google Calendar plugin for WordPress contains a stored cross‑site scripting flaw that allows an authenticated user with administrator privileges to inject arbitrary scripts into event descriptions. When an event page is viewed, the unsanitized script is executed in the visitor’s browser, enabling the attacker to hijack sessions, steal credentials, or deface the site. This vulnerability stems from inadequate input filtering and output escaping.

Affected Systems

Vendors: kimipooh. Product: List View Google Calendar, all releases up to and including version 7.4.3. The flaw affects only multi‑site WordPress installations where the unfiltered_html capability is disabled, and it requires the attacker to have administrator‑level access.

Risk and Exploitability

CVSS score is 4.4, indicating a moderate severity level. The exploitability metric is currently unavailable, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is local, as the attacker must be authenticated and possess administrative rights. Because the impact is limited to injected pages and limited to administrators, the overall risk is moderate; however, the plugin upgrade should be applied promptly to eliminate the possibility of script injection attacks.

Generated by OpenCVE AI on April 15, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade List View Google Calendar plugin to version 7.4.4 or later
  • If upgrading is not immediately possible, deactivate the plugin to prevent injected scripts from executing
  • Review administrator roles to ensure they do not have the unfiltered_html capability and consider enforcing stricter input sanitization for event descriptions

Generated by OpenCVE AI on April 15, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Kimipooh
Kimipooh list View Google Calendar
Wordpress
Wordpress wordpress
Vendors & Products Kimipooh
Kimipooh list View Google Calendar
Wordpress
Wordpress wordpress

Tue, 14 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description The List View Google Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the event description in all versions up to, and including, 7.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title List View Google Calendar <= 7.4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via Event Description
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Kimipooh List View Google Calendar
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-14T23:26:07.293Z

Reserved: 2026-02-12T12:56:59.489Z

Link: CVE-2026-2396

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-15T04:17:33.783

Modified: 2026-04-15T04:17:33.783

Link: CVE-2026-2396

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:53:37Z

Weaknesses