Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1127: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdiscover Timeline Event History

0
Medium
VulnerabilityCVE-2026-1127cvecve-2026-1127cwe-79
Published: Sat Jan 24 2026 (01/24/2026, 09:08:08 UTC)
Source: CVE Database V5
Vendor/Project: wpdiscover
Product: Timeline Event History

Description

CVE-2026-1127 is a reflected Cross-Site Scripting (XSS) vulnerability in the Timeline Event History WordPress plugin by wpdiscover, affecting all versions up to 3. 2. The vulnerability arises from improper sanitization and escaping of the 'id' parameter, allowing unauthenticated attackers to inject malicious scripts. Exploitation requires tricking a user into clicking a crafted link, leading to script execution in the victim's browser. The vulnerability has a CVSS score of 6. 1 (medium severity), impacting confidentiality and integrity but not availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with public-facing event history pages. Mitigation involves applying patches when available, implementing strict input validation, and employing Content Security Policy (CSP) headers. Countries with high WordPress adoption and active web ecosystems, such as Germany, the UK, France, and the Netherlands, are most likely affected.

AI-Powered Analysis

AILast updated: 01/24/2026, 09:36:05 UTC

Technical Analysis

CVE-2026-1127 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Timeline Event History plugin for WordPress, developed by wpdiscover. This vulnerability affects all versions up to and including 3.2. The root cause is insufficient input sanitization and output escaping of the 'id' parameter in HTTP requests. When an attacker crafts a malicious URL containing a specially designed 'id' parameter and convinces a user to click it, the injected script executes within the context of the victim's browser session. This can lead to theft of session cookies, defacement, or redirection to malicious sites, compromising confidentiality and integrity of user data. The vulnerability does not require authentication but does require user interaction (clicking a link). The CVSS v3.1 score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated seriously. The plugin is widely used in WordPress environments to track event histories, making it a relevant target for attackers aiming to compromise websites or their visitors.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress sites with the Timeline Event History plugin enabled. Successful exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, and exposure of sensitive information. This can damage organizational reputation, lead to data breaches, and potentially violate GDPR requirements concerning personal data protection. Public-facing websites, particularly those providing event or timeline information, are at higher risk. The vulnerability could also be leveraged as an initial vector for more complex attacks, including phishing or malware distribution. Although the vulnerability does not affect availability directly, the indirect consequences such as loss of customer trust and regulatory penalties can be severe. Organizations with high web traffic and user engagement are more exposed to exploitation attempts.

Mitigation Recommendations

Immediate mitigation should focus on removing or disabling the Timeline Event History plugin until a vendor patch is released. Organizations should monitor wpdiscover announcements and apply updates promptly once available. In the interim, implement strict input validation and output encoding on the 'id' parameter at the web application firewall (WAF) or reverse proxy level to block malicious payloads. Deploy Content Security Policy (CSP) headers to restrict script execution sources, reducing the impact of injected scripts. Educate users and administrators about the risks of clicking untrusted links. Conduct regular security audits of WordPress plugins and maintain an inventory to quickly identify vulnerable components. Consider using security plugins that provide XSS protection and monitor for suspicious activity. Finally, ensure that incident response plans include procedures for handling XSS incidents and potential data breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-17T20:40:53.018Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69748ef84623b1157cac2e75

Added to database: 1/24/2026, 9:20:56 AM

Last enriched: 1/24/2026, 9:36:05 AM

Last updated: 1/24/2026, 12:04:58 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats