Cross-Site Request Forgery Vulnerability in Georg Sexton WordPress Events Calendar Plugin
CVE-2025-32597
7.1HIGH
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 9 April 2025
Summary
A Cross-Site Request Forgery vulnerability has been identified in the George Sexton WordPress Events Calendar Plugin – connectDaily. This security issue could allow attackers to execute unauthorized actions on behalf of users, potentially leading to Cross-Site Scripting (XSS) attacks. The vulnerability impacts versions from n/a up to 1.4.8 of the plugin, compromising the security of WordPress sites that utilize this event management tool. It is essential for users to review their plugin versions and take necessary action to secure their installations.
Affected Version(s)
WordPress Events Calendar Plugin – connectDaily <= 1.4.8
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Dhabaleshwar Das (Patchstack Alliance)