CVE-2025-5540
BaseFortify
Publication date: 2025-06-26
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| emarketdesign | event_rsvp_and_simple_event_management | to 4.1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Event RSVP and Simple Event Management Plugin for WordPress. It occurs due to insufficient input sanitization and output escaping on user-supplied attributes in the plugin's 'emd_mb_meta' shortcode. Authenticated attackers with contributor-level access or higher can inject arbitrary web scripts into pages, which execute whenever a user accesses those pages.
How can this vulnerability impact me? :
The vulnerability allows attackers with contributor-level access or above to inject malicious scripts into web pages. This can lead to unauthorized actions such as stealing user session data, defacing websites, or performing actions on behalf of other users without their consent, potentially compromising the security and integrity of the affected WordPress site.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to uninstall or deactivate the Event RSVP and Simple Event Management Plugin, as it has been closed and removed from download availability pending a full security review. Avoid using versions up to and including 4.1.0, and monitor for updates or patches from the developers before reinstallation. [1]