CVE-2026-1127: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdiscover Timeline Event History
CVE-2026-1127 is a reflected Cross-Site Scripting (XSS) vulnerability in the Timeline Event History WordPress plugin by wpdiscover, affecting all versions up to 3. 2. The vulnerability arises from improper sanitization and escaping of the 'id' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. The vulnerability has a CVSS score of 6. 1 (medium severity), impacting confidentiality and integrity but not availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with public-facing event history pages. Mitigation involves applying patches when available, implementing strict input validation, and employing Content Security Policy (CSP) headers. Countries with high WordPress adoption and active web ecosystems, such as Germany, the UK, France, and the Netherlands, are most likely affected.
AI Analysis
Technical Summary
CVE-2026-1127 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Timeline Event History plugin for WordPress, developed by wpdiscover. This vulnerability affects all versions up to and including 3.2. The root cause is insufficient input sanitization and output escaping of the 'id' parameter in HTTP requests. When an attacker crafts a malicious URL containing a specially designed 'id' parameter and convinces a user to click it, the injected script executes within the context of the victim's browser session. This can lead to theft of session cookies, defacement, or redirection to malicious sites, compromising confidentiality and integrity of user data. The vulnerability does not require authentication but does require user interaction (clicking a link). The CVSS v3.1 score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated seriously. The plugin is widely used in WordPress environments to track event histories, making it a relevant target for attackers aiming to compromise websites or their visitors.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the Timeline Event History plugin enabled. Successful exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, and exposure of sensitive information. This can damage organizational reputation, lead to data breaches, and potentially violate GDPR requirements concerning personal data protection. Public-facing websites, particularly those providing event or timeline information, are at higher risk. The vulnerability could also be leveraged as an initial vector for more complex attacks, including phishing or malware distribution. Although the vulnerability does not affect availability directly, the indirect consequences such as loss of customer trust and regulatory penalties can be severe. Organizations with high web traffic and user engagement are more exposed to exploitation attempts.
Mitigation Recommendations
Immediate mitigation should focus on removing or disabling the Timeline Event History plugin until a vendor patch is released. Organizations should monitor wpdiscover announcements and apply updates promptly once available. In the interim, implement strict input validation and output encoding on the 'id' parameter at the web application firewall (WAF) or reverse proxy level to block malicious payloads. Deploy Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of injected scripts. Educate users and administrators about the risks of clicking untrusted links. Conduct regular security audits of WordPress plugins and maintain an inventory to quickly identify vulnerable components. Consider using security plugins that provide XSS protection and monitor for suspicious activity. Finally, ensure that incident response plans include procedures for handling XSS incidents and potential data breaches.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1127: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdiscover Timeline Event History
Description
CVE-2026-1127 is a reflected Cross-Site Scripting (XSS) vulnerability in the Timeline Event History WordPress plugin by wpdiscover, affecting all versions up to 3. 2. The vulnerability arises from improper sanitization and escaping of the 'id' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. The vulnerability has a CVSS score of 6. 1 (medium severity), impacting confidentiality and integrity but not availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with public-facing event history pages. Mitigation involves applying patches when available, implementing strict input validation, and employing Content Security Policy (CSP) headers. Countries with high WordPress adoption and active web ecosystems, such as Germany, the UK, France, and the Netherlands, are most likely affected.
AI-Powered Analysis
Technical Analysis
CVE-2026-1127 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Timeline Event History plugin for WordPress, developed by wpdiscover. This vulnerability affects all versions up to and including 3.2. The root cause is insufficient input sanitization and output escaping of the 'id' parameter in HTTP requests. When an attacker crafts a malicious URL containing a specially designed 'id' parameter and convinces a user to click it, the injected script executes within the context of the victim's browser session. This can lead to theft of session cookies, defacement, or redirection to malicious sites, compromising confidentiality and integrity of user data. The vulnerability does not require authentication but does require user interaction (clicking a link). The CVSS v3.1 score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated seriously. The plugin is widely used in WordPress environments to track event histories, making it a relevant target for attackers aiming to compromise websites or their visitors.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the Timeline Event History plugin enabled. Successful exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, and exposure of sensitive information. This can damage organizational reputation, lead to data breaches, and potentially violate GDPR requirements concerning personal data protection. Public-facing websites, particularly those providing event or timeline information, are at higher risk. The vulnerability could also be leveraged as an initial vector for more complex attacks, including phishing or malware distribution. Although the vulnerability does not affect availability directly, the indirect consequences such as loss of customer trust and regulatory penalties can be severe. Organizations with high web traffic and user engagement are more exposed to exploitation attempts.
Mitigation Recommendations
Immediate mitigation should focus on removing or disabling the Timeline Event History plugin until a vendor patch is released. Organizations should monitor wpdiscover announcements and apply updates promptly once available. In the interim, implement strict input validation and output encoding on the 'id' parameter at the web application firewall (WAF) or reverse proxy level to block malicious payloads. Deploy Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of injected scripts. Educate users and administrators about the risks of clicking untrusted links. Conduct regular security audits of WordPress plugins and maintain an inventory to quickly identify vulnerable components. Consider using security plugins that provide XSS protection and monitor for suspicious activity. Finally, ensure that incident response plans include procedures for handling XSS incidents and potential data breaches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-17T20:40:53.018Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69748ef84623b1157cac2e75
Added to database: 1/24/2026, 9:20:56 AM
Last enriched: 1/24/2026, 9:36:05 AM
Last updated: 1/24/2026, 12:04:58 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1300: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mehtevas Responsive Header Plugin
MediumCVE-2026-1208: CWE-352 Cross-Site Request Forgery (CSRF) in mainichiweb Friendly Functions for Welcart
MediumCVE-2026-1191: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in freemp JavaScript Notifier
MediumCVE-2026-1189: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in leadbi LeadBI Plugin for WordPress
MediumCVE-2025-13205: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.