Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown

0
Medium
VulnerabilityCVE-2026-1654cvecve-2026-1654cwe-79
Published: Thu Feb 05 2026 (02/05/2026, 09:13:45 UTC)
Source: CVE Database V5
Vendor/Project: pkthree
Product: Peter’s Date Countdown

Description

The Peter's Date Countdown plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:17:33 UTC

Technical Analysis

CVE-2026-1654 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Peter’s Date Countdown plugin for WordPress, affecting all versions up to and including 2.0.0. The root cause is insufficient input sanitization and output escaping of the $_SERVER['PHP_SELF'] parameter, which is used during web page generation. This parameter reflects the current script’s filename and path, and when improperly handled, allows attackers to inject arbitrary JavaScript code. Because the vulnerability is reflected, the malicious payload is embedded in a crafted URL that, when clicked by a user, causes the injected script to execute in the context of the vulnerable website. This can lead to theft of cookies, session tokens, or other sensitive information, as well as unauthorized actions performed on behalf of the user. The vulnerability does not require authentication, making it accessible to unauthenticated attackers, but it does require user interaction (clicking a malicious link). The vulnerability was published on February 5, 2026, with a CVSS v3.1 base score of 6.1, indicating medium severity. No patches or updates are currently linked, and no known exploits have been reported in the wild. The CWE classification is CWE-79, which covers improper neutralization of input during web page generation leading to XSS.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of users interacting with affected WordPress sites using the Peter’s Date Countdown plugin. Attackers can execute arbitrary scripts in the victim’s browser, potentially stealing session cookies, login credentials, or other sensitive data. This can lead to account takeover or unauthorized actions performed with the victim’s privileges. While availability is not directly impacted, successful exploitation can facilitate phishing attacks or malware distribution, indirectly harming users and the organization’s reputation. Since the vulnerability is unauthenticated and requires only user interaction, it can be exploited at scale via phishing campaigns. Organizations running WordPress sites with this plugin are at risk of reputational damage, data breaches, and loss of user trust if the vulnerability is exploited.

Mitigation Recommendations

1. Immediate mitigation should include disabling or removing the Peter’s Date Countdown plugin until a patched version is released. 2. If disabling is not feasible, implement a Web Application Firewall (WAF) with rules to detect and block suspicious payloads targeting the $_SERVER['PHP_SELF'] parameter or reflected XSS patterns. 3. Educate users and administrators about the risks of clicking suspicious links and encourage vigilance against phishing attempts. 4. Monitor web server logs for unusual URL patterns that may indicate exploitation attempts. 5. Developers should update the plugin code to properly sanitize and encode all user-controllable inputs, especially $_SERVER['PHP_SELF'], using secure coding practices such as context-aware output encoding. 6. Once available, promptly apply official patches or updates from the plugin vendor. 7. Conduct regular security assessments and penetration testing on WordPress sites to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-29T19:18:24.125Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69846323f9fa50a62f145d3d

Added to database: 2/5/2026, 9:30:11 AM

Last enriched: 2/27/2026, 9:17:33 AM

Last updated: 3/22/2026, 2:08:56 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses