Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14548: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kieranoshea Calendar

0
Medium
VulnerabilityCVE-2025-14548cvecve-2025-14548cwe-79
Published: Tue Dec 23 2025 (12/23/2025, 09:20:00 UTC)
Source: CVE Database V5
Vendor/Project: kieranoshea
Product: Calendar

Description

The Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'event_desc' parameter in all versions up to, and including, 1.3.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, granted they can convince an administrator to enable lower privilege users to manage calendar events via the plugin settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:25:35 UTC

Technical Analysis

The vulnerability CVE-2025-14548 affects the kieranoshea Calendar plugin for WordPress, specifically versions up to and including 1.3.16. It is a stored cross-site scripting (XSS) vulnerability categorized under CWE-79, caused by insufficient sanitization and escaping of the 'event_desc' parameter during web page generation. Authenticated users with Contributor-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into calendar event descriptions. When other users, including administrators, view the affected calendar pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious actions. Exploitation requires that administrators enable lower privilege users to manage calendar events, which is a configurable setting in the plugin. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required but no user interaction needed. No patches or official fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability highlights the risk of improper input validation in web applications, especially in widely used CMS plugins.

Potential Impact

This vulnerability can lead to unauthorized script execution in the context of affected websites, compromising the confidentiality and integrity of user sessions and data. Attackers with Contributor-level access can leverage this to execute persistent XSS attacks, potentially stealing administrator credentials, performing actions on behalf of administrators, or spreading malware. The impact is particularly severe in environments where administrators allow lower privilege users to manage calendar events, increasing the attack surface. While availability is not directly affected, the breach of trust and potential data leakage can cause reputational damage and operational disruptions. Organizations relying on the kieranoshea Calendar plugin in WordPress environments are at risk, especially those with multiple contributors or collaborative event management. The medium CVSS score reflects moderate risk but significant potential for privilege escalation and data compromise if exploited.

Mitigation Recommendations

Organizations should immediately review and restrict permissions related to calendar event management, ensuring only trusted users have Contributor-level or higher access. Administrators should disable the setting that allows lower privilege users to manage calendar events until a patch is available. Input validation and output escaping should be implemented or enhanced in the plugin code to sanitize the 'event_desc' parameter properly. Monitoring web logs and user activity for unusual event descriptions or script injections can help detect exploitation attempts. Employing a Web Application Firewall (WAF) with rules targeting XSS payloads can provide additional protection. Regularly updating WordPress plugins and subscribing to security advisories from the plugin vendor or WordPress security teams is critical. If feasible, temporarily disabling the Calendar plugin or replacing it with a secure alternative until a patch is released is advisable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-11T18:51:52.835Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694a62c0033f6f66d77784e9

Added to database: 12/23/2025, 9:37:04 AM

Last enriched: 2/27/2026, 11:25:35 AM

Last updated: 3/26/2026, 11:10:17 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses