CVE-2025-5801: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rejuancse Digital Events Calendar
The Digital Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘column’ parameter in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-5801 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Digital Events Calendar WordPress plugin developed by rejuancse. This vulnerability arises from improper neutralization of input during web page generation, specifically due to insufficient sanitization and output escaping of the 'column' parameter. The flaw exists in all versions up to and including 1.0.8. An authenticated attacker with Contributor-level privileges or higher can exploit this vulnerability by injecting arbitrary JavaScript code into pages generated by the plugin. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting its medium severity, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (Contributor or above), no user interaction, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable module. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in June 2025 and published in September 2025. This vulnerability is categorized under CWE-79, which is a common web application security weakness related to Cross-Site Scripting.
Potential Impact
For European organizations using WordPress sites with the Digital Events Calendar plugin, this vulnerability poses a significant risk to the confidentiality and integrity of user data and site content. Since exploitation requires only Contributor-level access, which is a relatively low privilege level often granted to trusted users or external content contributors, the attack surface is broader than vulnerabilities requiring administrative privileges. Exploitation could lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware through injected scripts. This could damage organizational reputation, lead to data breaches involving personal or sensitive information, and potentially violate GDPR regulations concerning data protection and breach notification. The scope change in the CVSS vector suggests that the vulnerability may affect multiple components or users beyond the initial compromised account, increasing the potential impact. The absence of known exploits in the wild provides a window for mitigation before widespread attacks occur. However, given the popularity of WordPress in Europe and the frequent use of event calendar plugins for public-facing websites, the risk remains material, especially for sectors such as education, public administration, and event management that rely heavily on such plugins.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Digital Events Calendar plugin and verify its version. Until an official patch is released, organizations should consider the following specific mitigations: 1) Restrict Contributor-level access strictly to trusted users and review existing user roles to minimize unnecessary privileges. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'column' parameter, focusing on script tags or JavaScript event handlers. 3) Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of injected scripts. 4) Monitor logs for unusual activity or unexpected changes in pages generated by the plugin. 5) If feasible, temporarily disable or replace the Digital Events Calendar plugin with alternative calendar solutions that are not vulnerable. 6) Stay alert for official patches or updates from the vendor and apply them promptly once available. 7) Educate content contributors about safe input practices and the risks of injecting untrusted content. These targeted actions go beyond generic advice by focusing on access control, input filtering, and containment strategies specific to this vulnerability's exploitation vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-5801: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rejuancse Digital Events Calendar
Description
The Digital Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘column’ parameter in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-5801 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Digital Events Calendar WordPress plugin developed by rejuancse. This vulnerability arises from improper neutralization of input during web page generation, specifically due to insufficient sanitization and output escaping of the 'column' parameter. The flaw exists in all versions up to and including 1.0.8. An authenticated attacker with Contributor-level privileges or higher can exploit this vulnerability by injecting arbitrary JavaScript code into pages generated by the plugin. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability has a CVSS 3.1 base score of 6.4, reflecting its medium severity, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (Contributor or above), no user interaction, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable module. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in June 2025 and published in September 2025. This vulnerability is categorized under CWE-79, which is a common web application security weakness related to Cross-Site Scripting.
Potential Impact
For European organizations using WordPress sites with the Digital Events Calendar plugin, this vulnerability poses a significant risk to the confidentiality and integrity of user data and site content. Since exploitation requires only Contributor-level access, which is a relatively low privilege level often granted to trusted users or external content contributors, the attack surface is broader than vulnerabilities requiring administrative privileges. Exploitation could lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware through injected scripts. This could damage organizational reputation, lead to data breaches involving personal or sensitive information, and potentially violate GDPR regulations concerning data protection and breach notification. The scope change in the CVSS vector suggests that the vulnerability may affect multiple components or users beyond the initial compromised account, increasing the potential impact. The absence of known exploits in the wild provides a window for mitigation before widespread attacks occur. However, given the popularity of WordPress in Europe and the frequent use of event calendar plugins for public-facing websites, the risk remains material, especially for sectors such as education, public administration, and event management that rely heavily on such plugins.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Digital Events Calendar plugin and verify its version. Until an official patch is released, organizations should consider the following specific mitigations: 1) Restrict Contributor-level access strictly to trusted users and review existing user roles to minimize unnecessary privileges. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns targeting the 'column' parameter, focusing on script tags or JavaScript event handlers. 3) Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of injected scripts. 4) Monitor logs for unusual activity or unexpected changes in pages generated by the plugin. 5) If feasible, temporarily disable or replace the Digital Events Calendar plugin with alternative calendar solutions that are not vulnerable. 6) Stay alert for official patches or updates from the vendor and apply them promptly once available. 7) Educate content contributors about safe input practices and the risks of injecting untrusted content. These targeted actions go beyond generic advice by focusing on access control, input filtering, and containment strategies specific to this vulnerability's exploitation vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-06T09:32:22.344Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a21e1c560fa9d94d41d
Added to database: 9/11/2025, 7:28:33 AM
Last enriched: 9/11/2025, 7:39:28 AM
Last updated: 9/11/2025, 7:07:37 PM
Views: 3
Related Threats
CVE-2025-10271: Cross Site Scripting in erjinzhi 10OA
MediumCVE-2025-10127: CWE-640 in Daikin Security Gateway
HighCVE-2025-9018: CWE-862 Missing Authorization in germanpearls Time Tracker
HighCVE-2025-48041: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
HighCVE-2025-48040: CWE-400 Uncontrolled Resource Consumption in Erlang OTP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.