CP Multi View Events Calendar Vulnerability (Medium) – CVE-2026-25465

CP Multi View Events Calendar Vulnerability (Medium) – CVE-2026-25465

by | Mar 19, 2026 | Plugins

Attack Vectors

CP Multi View Events Calendar (slug: cp-multi-view-calendar) versions up to and including 1.4.34 are affected by a Medium-severity Stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-25465, CVSS 6.4; vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).

The attack requires an authenticated WordPress account with Subscriber-level access or higher. In practical terms, this risk is most relevant if you allow public user registration, have large numbers of low-privilege users (communities, memberships, events signups), or if accounts can be taken over via password reuse or phishing.

Once a malicious script is saved (“stored”) through a vulnerable input path, it can execute automatically whenever a user visits the affected page. That means a single successful injection can impact many site visitors and internal users over time, including marketing, finance, and administrators.

Security Weakness

The issue is caused by insufficient input sanitization and output escaping in CP Multi View Events Calendar. This combination can allow attacker-controlled content to be stored in WordPress and later rendered to other users in a way that the browser interprets as executable code.

Because this is a stored XSS, it is typically more operationally risky than a one-time “reflected” XSS: the payload can remain embedded until it is found and removed, and it can trigger without extra clicks or confirmation dialogs.

Remediation status: there is currently no known patch available. Given that, organizations should treat mitigation as a business decision based on exposure (who can log in, who can publish content, and how mission-critical the plugin is).

Reference: CVE-2026-25465 record and Wordfence vulnerability advisory.

Technical or Business Impacts

Stored XSS can translate quickly into business risk because it can run in the context of your brand’s website. Depending on where the injected script appears and who views it, potential impacts include:

Account and session compromise: attackers may attempt to steal session tokens or manipulate actions a logged-in user can perform, potentially escalating access or misusing privileged accounts.

Brand and customer trust damage: visitors may see defaced pages, unexpected pop-ups, fake forms, or redirected traffic—eroding trust and impacting conversion rates and campaign performance.

Data exposure and compliance concerns: if internal users (marketing operations, finance, HR, compliance) view affected pages while logged in, attacker scripts could potentially access data exposed in the browser session or trigger unauthorized actions, increasing incident response and reporting burdens.

Operational disruption: identifying where payloads were injected, cleaning affected content, rotating credentials, and validating that no secondary compromise occurred can consume significant staff time and agency costs.

Recommended business-aligned mitigations (given no patch): consider uninstalling and replacing CP Multi View Events Calendar if feasible. If you must keep it temporarily, reduce exposure by disabling public registrations (if possible), tightening who can create or edit event/calendar content, reviewing Subscriber permissions, monitoring for suspicious content changes, and adding compensating controls such as a reputable web application firewall (WAF) and stricter content review workflows.

Similar Attacks

Stored XSS has repeatedly been used to spread quickly and impact large user bases because the malicious code persists and executes for each viewer. Notable real-world examples include:

Samy worm (MySpace, 2005) — a classic stored XSS incident that propagated automatically as users viewed infected profiles.

Twitter “onMouseOver” XSS (2010) — a widespread XSS event that caused unintended actions as users viewed or interacted with tweets.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers