UNKNOWN (0.0)
    Plugin

    Stored Cross-Site Scripting in Hammas Calendar Plugin via 'apix' Parameter

    Published Date: 3/7/2026
    CVE ID: CVE-2026-1902

    Summary

    The Hammas Calendar plugin for WordPress is affected by a Stored Cross-Site Scripting (XSS) vulnerability. The flaw is present in versions up to 1.5.11, allowing authenticated users with Contributor-level access and above to inject malicious scripts through the 'apix' parameter.

    Vulnerability Details

    This vulnerability is found in the Hammas Calendar plugin, where the 'apix' parameter within the 'hp-calendar-manage-redirect' shortcode does not have proper sanitization and escaping. As a result, attackers with at least Contributor-level access can exploit this flaw to input harmful scripts that persist within the website. When other users, including administrators and visitors, access the page where the script is injected, the script executes in their browsers. This could lead to unauthorized actions or data theft, compromising both user security and website integrity. The issue arises from inadequate validation of input data and echo of output without encoding HTML entities, a common pathway for XSS attacks. Consequently, the vulnerability can affect user browsers and potentially escalate in severity by affecting authenticated sessions.

    Recommendations

    To mitigate this vulnerability, site administrators should restrict Contributor-level access only to trusted individuals. Additionally, consider using security plugins that provide additional input sanitization and output escaping. Regularly audit and update all plugins and themes to minimize exposure to known vulnerabilities.

    Available Fixes

    Last Updated: 3/10/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More