Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13669: CWE-79 Cross-Site Scripting (XSS) in CalendApp

0
Medium
VulnerabilityCVE-2024-13669cvecve-2024-13669cwe-79
Published: Wed Feb 26 2025 (02/26/2025, 06:00:11 UTC)
Source: CVE Database V5
Product: CalendApp

Description

The CalendApp WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

AI-Powered Analysis

AILast updated: 01/09/2026, 20:41:08 UTC

Technical Analysis

CVE-2024-13669 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the CalendApp WordPress plugin, affecting versions through 1.1. The vulnerability stems from the plugin's failure to properly sanitize and escape a parameter before reflecting it back in the webpage output. This allows an attacker to craft a malicious URL or input that, when visited or processed by a high-privilege user such as an administrator, executes arbitrary JavaScript code within the context of the victim's browser session. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1, reflecting a medium severity level with the following vector: network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) with no impact on availability (A:N). The scope change indicates that the vulnerability affects components beyond the initially vulnerable component, potentially impacting the entire web application. Although no public exploits are known at this time, the vulnerability could be leveraged by attackers to steal session cookies, perform actions on behalf of administrators, or deliver further payloads leading to privilege escalation or data compromise. The vulnerability is particularly dangerous because it targets high-privilege users, increasing the potential impact. No official patches have been linked yet, so mitigation may require manual intervention or disabling the plugin until a fix is available.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those relying on WordPress websites with the CalendApp plugin installed. Successful exploitation could lead to compromise of administrator accounts, allowing attackers to manipulate website content, access sensitive data, or deploy further attacks such as malware distribution or phishing campaigns. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruptions. The reflected XSS nature requires user interaction, typically by tricking an admin into clicking a malicious link, which means targeted spear-phishing or social engineering campaigns could be effective. Given the widespread use of WordPress across Europe, organizations in sectors such as government, finance, healthcare, and e-commerce are particularly at risk due to the sensitive nature of their data and services. The medium severity score suggests the impact is moderate but should not be underestimated due to the high privilege level of targeted users.

Mitigation Recommendations

1. Immediately audit all WordPress installations for the presence of the CalendApp plugin and identify affected versions (up to 1.1). 2. Disable or uninstall the CalendApp plugin until an official patch or update is released that addresses the XSS vulnerability. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns or reflected XSS payloads targeting the plugin’s parameters. 4. Educate administrators and privileged users about the risk of clicking on untrusted links, especially those that may contain malicious payloads. 5. Monitor web server and application logs for unusual requests containing suspicious parameters that could indicate exploitation attempts. 6. Once a patch is available, apply it promptly and verify that input sanitization and output escaping are correctly implemented. 7. Consider employing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 8. Regularly review and update WordPress plugins and core to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-01-23T17:55:19.377Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696166b3047de42cfc9dfbf8

Added to database: 1/9/2026, 8:36:03 PM

Last enriched: 1/9/2026, 8:41:08 PM

Last updated: 1/10/2026, 6:54:18 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats