WP Event Aggregator: Import Eventbrite events, Meetup events, socia…

WP Event Aggregator: Import Eventbrite events, Meetup events, socia…

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2026-1941 affects the WordPress plugin “WP Event Aggregator: Import Eventbrite events, Meetup events, social events and any iCal Events into Event Calendar” (slug: wp-event-aggregator) in versions up to and including 1.8.7. It is rated Medium severity (CVSS 6.4).

The primary attack path is through the plugin’s wp_events shortcode. An authenticated user with at least Contributor permissions (or higher) can supply malicious shortcode attributes that are stored in site content. When a visitor later loads that affected page, the injected script can run in their browser without any extra clicks.

This matters because many organizations grant Contributor access to internal teams, agencies, freelancers, or partners. If any one of those accounts is compromised—or permissions are broader than intended—an attacker can place persistent malicious code inside otherwise legitimate pages.

Security Weakness

The weakness is a stored cross-site scripting (XSS) issue caused by insufficient input sanitization and output escaping of user-supplied shortcode attributes in the wp_events shortcode. In plain terms: the plugin does not consistently treat certain inputs as untrusted, allowing attacker-controlled content to be saved and later rendered as active script.

Because the payload is stored and triggers when the page is viewed, this can turn a single compromised Contributor account into an ongoing risk that repeatedly impacts site visitors, staff, and customers—until the malicious content is found and removed.

Remediation is straightforward: update WP Event Aggregator to version 1.9.0 or newer, which includes a fix for this issue.

Technical or Business Impacts

From a business-risk perspective, stored XSS can undermine trust and create downstream exposure even when server data is not directly stolen. If a malicious script runs on a branded page, visitors may be redirected, shown fraudulent forms, or silently tracked—damaging brand reputation and campaign performance.

Potential impacts include:

Brand and revenue risk: compromised landing pages can reduce conversion rates, disrupt paid campaigns, and erode confidence in your brand—especially if the affected pages are tied to events, registrations, or lead capture.

Customer and employee exposure: scripts executed in a user’s browser can be used to trick users into revealing information or interacting with fraudulent content, increasing the likelihood of phishing success.

Compliance and reporting burden: depending on what pages are affected and who is impacted, security and compliance teams may need to investigate, document findings, and assess regulatory or contractual notification requirements.

Operational disruption: incident response may require emergency content reviews, access audits for Contributor-level users, and coordination across marketing, IT, and compliance to ensure all injected content is removed and the root cause is addressed.

Similar Attacks

Stored XSS has been repeatedly used to inject persistent malicious scripts into widely visited pages and forms, often targeting organizations through CMS plugins and content features. For background and real-world context, see:

Wordfence Blog (WordPress vulnerability and attack reporting)

CISA Alerts (public reporting on active exploitation and risk to organizations)

SANS Internet Storm Center Diary (ongoing security incident examples)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers