Description
The Next Date plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'default' shortcode attribute in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-05-12
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Next Date WordPress plugin contains a stored cross‑site scripting flaw that allows an authenticated user with contributor or higher privileges to insert arbitrary scripts into the ‘default’ shortcode attribute. The injected code is then executed whenever a page containing the shortcode is rendered, potentially compromising user sessions and leaking data. The weakness is a lack of sanitization and output escaping—a classic XSS vulnerability (CWE‑79).

Affected Systems

WordPress sites that have installed the Next Date plugin version 1.0 or earlier, regardless of the specific WordPress version. Any user who has contributor–level or higher permissions on the affected site can exploit the flaw.

Risk and Exploitability

The CVSS score of 6.4 classifies this as a moderate severity vulnerability. No EPSS score is available, but the lack of a public exploit and its limited attack surface (requiring contributor access) reduces the immediate risk. The vulnerability is not listed in CISA KEV, and it can only be triggered by attackers who already have authenticated contributor-level access. Exploitation would involve editing posts or pages that include the Next Date shortcode and embedding malicious JavaScript into the default attribute.

Generated by OpenCVE AI on May 12, 2026 at 10:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the newest available version of the Next Date plugin (or a patch that sanitizes the default shortcode attribute).
  • If an upgrade is not immediately possible, remove or disable the Next Date plugin until a fix is released.
  • Limit contributor permissions to the minimum required or block the ability for contributors to edit pages that use the Next Date shortcode.

Generated by OpenCVE AI on May 12, 2026 at 10:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Next Date plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'default' shortcode attribute in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Next Date <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'default' Shortcode Attribute
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-12T07:48:23.977Z

Reserved: 2026-03-26T17:47:41.202Z

Link: CVE-2026-4920

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-12T09:16:54.530

Modified: 2026-05-12T14:03:52.757

Link: CVE-2026-4920

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T10:30:13Z

Weaknesses