Cross-Site Request Forgery Vulnerability in Georg Sexton WordPress Events Calendar Plugin
CVE-2025-32597

7.1HIGH

Key Information:

Vendor
WordPress
Vendor
CVE Published:
9 April 2025

Summary

A Cross-Site Request Forgery vulnerability has been identified in the George Sexton WordPress Events Calendar Plugin – connectDaily. This security issue could allow attackers to execute unauthorized actions on behalf of users, potentially leading to Cross-Site Scripting (XSS) attacks. The vulnerability impacts versions from n/a up to 1.4.8 of the plugin, compromising the security of WordPress sites that utilize this event management tool. It is essential for users to review their plugin versions and take necessary action to secure their installations.

Affected Version(s)

WordPress Events Calendar Plugin – connectDaily <= 1.4.8

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dhabaleshwar Das (Patchstack Alliance)
.
CVE-2025-32597 : Cross-Site Request Forgery Vulnerability in Georg Sexton WordPress Events Calendar Plugin | SecurityVulnerability.io