CVE-2025-2799: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpeventmanager WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce
The WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tag-name’ parameter in all versions up to, and including, 3.1.49 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-2799 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the WP Event Manager plugin for WordPress, specifically the Events Calendar, Registrations, and Sell Tickets with WooCommerce components. The vulnerability arises from improper input sanitization and output escaping of the 'tag-name' parameter in all plugin versions up to and including 3.1.49. This flaw allows an authenticated attacker with administrator-level privileges to inject arbitrary malicious scripts into pages generated by the plugin. These scripts execute in the context of users who access the compromised pages, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability is constrained to multi-site WordPress installations or those where the 'unfiltered_html' capability is disabled, limiting its scope somewhat. The CVSS v3.1 base score is 4.4, reflecting a network attack vector with high attack complexity and requiring high privileges but no user interaction. The impact is limited to confidentiality and integrity, with no direct availability impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on their use of the affected WP Event Manager plugin within WordPress multi-site environments or configurations with restricted HTML filtering. Organizations running event management, ticketing, or registration systems on WordPress that utilize this plugin are at risk of targeted attacks that could compromise user sessions, steal sensitive data, or manipulate site content. This could lead to reputational damage, data breaches involving personal or payment information, and potential regulatory non-compliance under GDPR if personal data is exposed. The requirement for administrator-level access to exploit the vulnerability reduces the risk of external attackers directly exploiting it but raises concerns about insider threats or compromised admin accounts. The lack of user interaction needed means that once the malicious script is injected, any user visiting the affected pages could be impacted. Given the widespread use of WordPress and WooCommerce in Europe, especially among small to medium enterprises and event organizers, the vulnerability could have a moderate impact if exploited.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Immediately audit WordPress installations to identify the presence of the WP Event Manager plugin and confirm if it is used in a multi-site setup or with unfiltered_html disabled. 2) Restrict administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3) Implement web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'tag-name' parameter. 4) Monitor logs for unusual administrator activity or unexpected changes in event-related pages. 5) Until an official patch is released, consider disabling or removing the plugin if feasible, or isolate the affected functionality to reduce exposure. 6) Educate administrators on the risks of XSS and the importance of sanitizing inputs when adding or editing tags. 7) Regularly update WordPress core and plugins to incorporate security fixes promptly once available. These targeted actions go beyond generic advice by focusing on access control, monitoring, and configuration specific to this vulnerability's exploitation conditions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-2799: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpeventmanager WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce
Description
The WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tag-name’ parameter in all versions up to, and including, 3.1.49 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-2799 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the WP Event Manager plugin for WordPress, specifically the Events Calendar, Registrations, and Sell Tickets with WooCommerce components. The vulnerability arises from improper input sanitization and output escaping of the 'tag-name' parameter in all plugin versions up to and including 3.1.49. This flaw allows an authenticated attacker with administrator-level privileges to inject arbitrary malicious scripts into pages generated by the plugin. These scripts execute in the context of users who access the compromised pages, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability is constrained to multi-site WordPress installations or those where the 'unfiltered_html' capability is disabled, limiting its scope somewhat. The CVSS v3.1 base score is 4.4, reflecting a network attack vector with high attack complexity and requiring high privileges but no user interaction. The impact is limited to confidentiality and integrity, with no direct availability impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on their use of the affected WP Event Manager plugin within WordPress multi-site environments or configurations with restricted HTML filtering. Organizations running event management, ticketing, or registration systems on WordPress that utilize this plugin are at risk of targeted attacks that could compromise user sessions, steal sensitive data, or manipulate site content. This could lead to reputational damage, data breaches involving personal or payment information, and potential regulatory non-compliance under GDPR if personal data is exposed. The requirement for administrator-level access to exploit the vulnerability reduces the risk of external attackers directly exploiting it but raises concerns about insider threats or compromised admin accounts. The lack of user interaction needed means that once the malicious script is injected, any user visiting the affected pages could be impacted. Given the widespread use of WordPress and WooCommerce in Europe, especially among small to medium enterprises and event organizers, the vulnerability could have a moderate impact if exploited.
Mitigation Recommendations
European organizations should prioritize the following specific mitigation steps: 1) Immediately audit WordPress installations to identify the presence of the WP Event Manager plugin and confirm if it is used in a multi-site setup or with unfiltered_html disabled. 2) Restrict administrator-level access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3) Implement web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'tag-name' parameter. 4) Monitor logs for unusual administrator activity or unexpected changes in event-related pages. 5) Until an official patch is released, consider disabling or removing the plugin if feasible, or isolate the affected functionality to reduce exposure. 6) Educate administrators on the risks of XSS and the importance of sanitizing inputs when adding or editing tags. 7) Regularly update WordPress core and plugins to incorporate security fixes promptly once available. These targeted actions go beyond generic advice by focusing on access control, monitoring, and configuration specific to this vulnerability's exploitation conditions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-25T19:52:06.849Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6877391fa83201eaacd3599a
Added to database: 7/16/2025, 5:31:11 AM
Last enriched: 7/16/2025, 5:46:19 AM
Last updated: 7/16/2025, 6:36:24 AM
Views: 3
Related Threats
Code Execution Through Email: How I Used Claude to Hack
MediumCVE-2025-7673: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Zyxel VMG8825-T50K firmware
CriticalCVE-2025-7359: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in danielriera Counter live visitors for WooCommerce
HighCVE-2025-6747: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themefusion Avada (Fusion) Builder
MediumCVE-2025-6043: CWE-862 Missing Authorization in malcure Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.