CVE-2025-58861: CWE-352 Cross-Site Request Forgery (CSRF) in WP Corner Quick Event Calendar
Cross-Site Request Forgery (CSRF) vulnerability in WP Corner Quick Event Calendar allows Stored XSS. This issue affects Quick Event Calendar: from n/a through 1.4.9.
AI Analysis
Technical Summary
CVE-2025-58861 is a high-severity vulnerability affecting the WordPress plugin 'Quick Event Calendar' developed by WP Corner. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) that enables an attacker to perform unauthorized actions on behalf of an authenticated user. Specifically, this CSRF vulnerability allows an attacker to inject stored Cross-Site Scripting (XSS) payloads into the plugin's event calendar functionality. The affected versions include all versions up to and including 1.4.9. The CVSS 3.1 base score is 7.1, indicating a high severity with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L, meaning the attack can be launched remotely over the network without privileges but requires user interaction. The scope is changed, and the impact affects confidentiality, integrity, and availability to a limited extent. The vulnerability arises because the plugin does not properly verify the authenticity of requests modifying calendar events, allowing attackers to craft malicious requests that, when executed by an authenticated user, result in stored XSS. This stored XSS can lead to session hijacking, privilege escalation, or further exploitation within the WordPress environment. No patches or fixes are currently linked, and no known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using WordPress sites with the Quick Event Calendar plugin, this vulnerability poses a significant risk. Attackers can exploit the CSRF to inject malicious scripts that persist in the calendar data, potentially compromising site administrators or users who interact with the calendar. This can lead to unauthorized access, data leakage, or manipulation of event data, impacting the integrity and availability of web services. Organizations in sectors such as government, finance, education, and healthcare that rely on WordPress for public-facing or internal event management could face reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruptions. Since the attack requires user interaction (e.g., an authenticated user visiting a malicious link), phishing or social engineering campaigns could be used to facilitate exploitation. The lack of patches increases the window of exposure, making timely mitigation critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the Quick Event Calendar plugin is in use and verify the version. Until an official patch is released, mitigation should include disabling or uninstalling the plugin to eliminate the attack vector. Implementing Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts and XSS payloads targeting calendar endpoints can reduce risk. Enforce strict Content Security Policy (CSP) headers to limit the impact of any injected scripts. Educate users and administrators about phishing risks and the importance of not clicking on untrusted links while authenticated. Additionally, ensure that WordPress core and all plugins are kept up to date and monitor security advisories from WP Corner and Patchstack for forthcoming patches. Employing multi-factor authentication (MFA) can also reduce the risk of session hijacking resulting from XSS exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-58861: CWE-352 Cross-Site Request Forgery (CSRF) in WP Corner Quick Event Calendar
Description
Cross-Site Request Forgery (CSRF) vulnerability in WP Corner Quick Event Calendar allows Stored XSS. This issue affects Quick Event Calendar: from n/a through 1.4.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-58861 is a high-severity vulnerability affecting the WordPress plugin 'Quick Event Calendar' developed by WP Corner. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352) that enables an attacker to perform unauthorized actions on behalf of an authenticated user. Specifically, this CSRF vulnerability allows an attacker to inject stored Cross-Site Scripting (XSS) payloads into the plugin's event calendar functionality. The affected versions include all versions up to and including 1.4.9. The CVSS 3.1 base score is 7.1, indicating a high severity with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L, meaning the attack can be launched remotely over the network without privileges but requires user interaction. The scope is changed, and the impact affects confidentiality, integrity, and availability to a limited extent. The vulnerability arises because the plugin does not properly verify the authenticity of requests modifying calendar events, allowing attackers to craft malicious requests that, when executed by an authenticated user, result in stored XSS. This stored XSS can lead to session hijacking, privilege escalation, or further exploitation within the WordPress environment. No patches or fixes are currently linked, and no known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using WordPress sites with the Quick Event Calendar plugin, this vulnerability poses a significant risk. Attackers can exploit the CSRF to inject malicious scripts that persist in the calendar data, potentially compromising site administrators or users who interact with the calendar. This can lead to unauthorized access, data leakage, or manipulation of event data, impacting the integrity and availability of web services. Organizations in sectors such as government, finance, education, and healthcare that rely on WordPress for public-facing or internal event management could face reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruptions. Since the attack requires user interaction (e.g., an authenticated user visiting a malicious link), phishing or social engineering campaigns could be used to facilitate exploitation. The lack of patches increases the window of exposure, making timely mitigation critical.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the Quick Event Calendar plugin is in use and verify the version. Until an official patch is released, mitigation should include disabling or uninstalling the plugin to eliminate the attack vector. Implementing Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts and XSS payloads targeting calendar endpoints can reduce risk. Enforce strict Content Security Policy (CSP) headers to limit the impact of any injected scripts. Educate users and administrators about phishing risks and the importance of not clicking on untrusted links while authenticated. Additionally, ensure that WordPress core and all plugins are kept up to date and monitor security advisories from WP Corner and Patchstack for forthcoming patches. Employing multi-factor authentication (MFA) can also reduce the risk of session hijacking resulting from XSS exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-05T10:49:57.447Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68baeaa657c5b37b67a46165
Added to database: 9/5/2025, 1:50:30 PM
Last enriched: 9/5/2025, 1:54:25 PM
Last updated: 9/5/2025, 10:22:26 PM
Views: 5
Related Threats
CVE-2025-58373: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RooCodeInc Roo-Code
MediumCVE-2025-58371: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
CriticalCVE-2025-58372: CWE-732: Incorrect Permission Assignment for Critical Resource in RooCodeInc Roo-Code
HighCVE-2025-58370: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
HighCVE-2025-58369: CWE-400: Uncontrolled Resource Consumption in typelevel fs2
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.