Description
The CM Custom Reports plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'date_from' and 'date_to' parameters in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-03-07
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The CM Custom Reports plugin for WordPress is affected by a reflected Cross‑Site Scripting flaw that occurs when the 'date_from' or 'date_to' parameters are not properly sanitized or escaped. An unauthenticated attacker can provide malicious input through these parameters, causing the plugin to output a script that will execute in a victim’s browser when the page is loaded. The vulnerability allows the injection of arbitrary web scripts, which would run with the privileges of the user viewing the page.

Affected Systems

WordPress sites that have the CM Custom Reports plugin from Creativemindssolutions installed on versions 1.2.7 or earlier are affected. The flaw is present in all releases up to and including 1.2.7, as evidenced by the source code references for the 1.2.7 tag and trunk.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate severity reflected XSS vulnerability. The EPSS score of less than 1% suggests a low likelihood of exploitation in the near term. The flaw is not listed in the CISA KEV catalog. Because the flaw can be triggered by an unauthenticated attacker through crafted URLs or form inputs, the primary attack vector is social engineering via a malicious link. Successful exploitation requires a victim to load the affected page, after which the injected script will execute in the victim’s browser.

Generated by OpenCVE AI on April 15, 2026 at 19:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the CM Custom Reports plugin to version 1.2.8 or later, which removes the faulty input handling.
  • If an immediate update is not possible, disable or remove the plugin to prevent the vulnerable code path from being served.
  • Implement a web application firewall rule or server‑side filter that blocks or sanitizes the 'date_from' and 'date_to' parameters to prevent injection of script or HTML artifacts before they reach the application.

Generated by OpenCVE AI on April 15, 2026 at 19:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Creativemindssolutions
Creativemindssolutions cm Custom Reports – Flexible Reporting To Track What Matters Most
Wordpress
Wordpress wordpress
Vendors & Products Creativemindssolutions
Creativemindssolutions cm Custom Reports – Flexible Reporting To Track What Matters Most
Wordpress
Wordpress wordpress

Sat, 07 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description The CM Custom Reports plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'date_from' and 'date_to' parameters in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title CM Custom Reports <= 1.2.7 - Reflected Cross-Site Scripting via 'date_from' and 'date_to' Parameters
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Creativemindssolutions Cm Custom Reports – Flexible Reporting To Track What Matters Most
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:30:51.135Z

Reserved: 2026-02-12T21:16:00.969Z

Link: CVE-2026-2431

cve-icon Vulnrichment

Updated: 2026-03-09T19:00:22.679Z

cve-icon NVD

Status : Deferred

Published: 2026-03-07T02:16:12.430

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-2431

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:00:06Z

Weaknesses