CVE-2026-1252
Stored XSS in Events Listing Widget Plugin 'Event URL' Parameter
Publication date: 2026-02-06
Last updated on: 2026-02-06
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | events_listing_widget | to 1.3.4 (inc) |
| wordfence | events_listing_widget | 1.3.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Events Listing Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'Event URL' parameter in all versions up to and including 1.3.4. This vulnerability arises because the plugin does not properly sanitize input or escape output for this parameter.
An authenticated attacker with Author-level access or higher can inject arbitrary web scripts into pages by exploiting this vulnerability. These scripts will execute whenever any user accesses the injected page, potentially compromising user data or site integrity.
How can this vulnerability impact me? :
This vulnerability allows an attacker with Author-level access or above to inject malicious scripts into the website via the 'Event URL' parameter. When other users visit the affected pages, these scripts execute in their browsers.
- It can lead to theft of user credentials or session cookies.
- It may enable unauthorized actions on behalf of users.
- It can result in defacement or manipulation of website content.
- It undermines user trust and website security.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability involves Stored Cross-Site Scripting (XSS) via the 'Event URL' parameter in the Events Listing Widget plugin for WordPress versions up to 1.3.4. Detection involves identifying if your WordPress installation uses this plugin version and if any event posts contain malicious scripts injected in the 'Event URL' field."}, {'type': 'paragraph', 'content': 'To detect exploitation attempts or presence of the vulnerability, you can:'}, {'type': 'list_item', 'content': 'Check the installed version of the Events Listing Widget plugin to see if it is 1.3.4 or earlier.'}, {'type': 'list_item', 'content': "Search the WordPress database for suspicious or script-containing values in the 'events_listing_url' post meta field."}, {'type': 'list_item', 'content': "Monitor HTTP requests for unusual payloads targeting the 'Event URL' parameter, especially from authenticated users with Author-level access or higher."}, {'type': 'paragraph', 'content': 'Example commands to assist detection (assuming access to the WordPress database and server):'}, {'type': 'list_item', 'content': 'To check plugin version via WP-CLI: `wp plugin list --status=active | grep events-listing-widget`'}, {'type': 'list_item', 'content': "To search for suspicious scripts in the event URLs in the database (MySQL):\n```sql\nSELECT post_id, meta_value FROM wp_postmeta WHERE meta_key = 'events_listing_url' AND meta_value LIKE '%<script>%';\n```"}, {'type': 'list_item', 'content': 'To monitor web server logs for suspicious POST requests to event editing endpoints containing script tags.'}] [1, 4]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': "The primary mitigation step is to update the Events Listing Widget plugin to version 1.3.5 or later, where the vulnerability has been fixed by properly sanitizing the 'Event URL' input using `sanitize_url()` before saving."}, {'type': 'paragraph', 'content': 'Additional immediate steps include:'}, {'type': 'list_item', 'content': 'Restrict Author-level and higher user permissions to trusted users only, as exploitation requires authenticated users with such access.'}, {'type': 'list_item', 'content': 'Review and clean any injected malicious scripts in existing event URLs stored in the database.'}, {'type': 'list_item', 'content': "Implement Web Application Firewall (WAF) rules to block suspicious payloads targeting the 'Event URL' parameter."}, {'type': 'list_item', 'content': 'Ensure proper output escaping in any custom themes or plugins that display event URLs.'}] [2, 4]