First published: Thu Jan 23 2025(Updated: )
The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Event Calendar Link Widget through the html_tag attribute in all versions up to, and including, 6.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
The Events Calendar | <=6.9.0 | |
The Events Calendar | <6.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12118 is classified as a high severity vulnerability due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-12118, update the The Events Calendar plugin to version 6.9.1 or later which addresses the input sanitization issue.
CVE-2024-12118 affects all versions of The Events Calendar plugin up to and including version 6.9.0.
CVE-2024-12118 is a stored cross-site scripting (XSS) vulnerability that allows attackers to inject malicious scripts.
Yes, due to the stored XSS vulnerability in CVE-2024-12118, user data can be compromised if exploited.