Input validation vulnerability in Simple Calendar – Google Calendar Plugin 3.2.6

The Simple Calendar – Google Calendar Plugin is a plugin for WordPress websites that is vulnerable to a type of attack called Stored Cross-Site Scripting. This type of attack can be used by someone with ‘contributor-level’ or higher permissions, to inject malicious web scripts into pages. This means that when a user visits an infected page, the malicious scripts will be triggered and could be used to steal information or cause harm. To protect against this type of attack, all versions up to and including 3.2.6 of the plugin should be updated.

Detected in:

Simple Calendar – Google Calendar Plugin fixed vulnerable versions: >= * <= 3.2.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.