Vulnerabilities > Webnus > Modern Events Calendar Lite > 6.1.6

DATE CVE VULNERABILITY TITLE RISK
2023-10-20 CVE-2023-4021 Cross-site Scripting vulnerability in Webnus Modern Events Calendar Lite
The Modern Events Calendar lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Google API key and Calendar ID in versions up to, but not including, 7.1.0 due to insufficient input sanitization and output escaping.
network
low complexity
webnus CWE-79
4.8
2023-03-27 CVE-2023-1400 Unspecified vulnerability in Webnus Modern Events Calendar Lite
The Modern Events Calendar Lite WordPress plugin before 6.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
network
low complexity
webnus
4.8
2022-06-16 CVE-2022-30533 Cross-site Scripting vulnerability in Webnus Modern Events Calendar Lite
Cross-site scripting vulnerability in Modern Events Calendar Lite versions prior to 6.3.0 allows remote an authenticated attacker to inject an arbitrary script via unspecified vectors.
network
low complexity
webnus CWE-79
5.4
2022-04-14 CVE-2022-27848 Cross-site Scripting vulnerability in Webnus Modern Events Calendar Lite
Authenticated (admin+ user) Stored Cross-Site Scripting (XSS) in Modern Events Calendar Lite (WordPress plugin) <= 6.5.1
network
low complexity
webnus CWE-79
4.8
2022-03-21 CVE-2022-0364 Unspecified vulnerability in Webnus Modern Events Calendar Lite
The Modern Events Calendar Lite WordPress plugin before 6.4.0 does not sanitize and escape some of the Hourly Schedule parameters which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
network
low complexity
webnus
5.4
2022-01-17 CVE-2021-25046 Unspecified vulnerability in Webnus Modern Events Calendar Lite
The Modern Events Calendar Lite WordPress plugin before 6.2.0 alloed any logged-in user, even a subscriber user, may add a category whose parameters are incorrectly escaped in the admin panel, leading to stored XSS.
network
low complexity
webnus
5.4