CVE-2025-28960
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in regibaer Evangelische Termine evangtermine allows Reflected XSS.This issue affects Evangelische Termine: from n/a through <= 3.3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS vulnerability in WordPress Evangelische Termine plugin up to 3.3 allows attackers to inject malicious scripts via crafted requests, requiring user interaction.
The Evangelische Termine plugin for WordPress (versions up to 3.3) contains a reflected cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw enables an attacker to inject arbitrary HTML and JavaScript into the application's response.
Exploitation requires a privileged user to perform an action such as clicking a malicious link, visiting a crafted page, or submitting a form [1]. The vulnerability is expected to be used in mass-exploit campaigns, targeting thousands of websites regardless of size or popularity [1].
Successful exploitation allows an attacker to inject malicious scripts, including redirects, advertisements, and other HTML payloads, which execute when other users visit the affected site [1]. This can lead to defacement, credential theft, or further compromise.
As an immediate mitigation, users should update the plugin to a patched version if available. If updating is not possible, applying a mitigation rule from Patchstack can block attacks until an official patch is released [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.