CVE-2025-69384
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdiscover Timeline Event History timeline-event-history allows Reflected XSS.This issue affects Timeline Event History: from n/a through <= 3.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in the Timeline Event History WordPress plugin through version 3.2 allows attackers to inject malicious scripts via unneutralized user input.
Vulnerability
Overview
The Timeline Event History plugin for WordPress versions 3.2 and earlier suffers from a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. The vulnerability occurs when the plugin fails to sanitize or encode user-supplied data before including it in the page output, allowing attacker-controlled script code to execute in the context of the victim's browser [1].
Attack
Vector and Prerequisites
Exploitation requires user interaction: a victim (such as an administrator or another privileged user) must click a crafted link, visit a specially prepared page, or submit a malicious form [1]. No authentication is needed to deliver the payload, but the target user's session is required for the injected script to execute within the WordPress admin area. This pattern is commonly used in mass-exploit campaigns targeting WordPress plugins [1].
Impact
Successful exploitation allows an attacker to inject arbitrary HTML and JavaScript payloads [1]. This can lead to session hijacking, defacement, redirection to malicious sites, or theft of sensitive information visible during the victim's session. The CVSS v3 score is 7.1 (High), reflecting the potential for widespread automated attacks [1].
Mitigation
Status
Patchstack has released a mitigation rule that blocks attacks against this vulnerability until an official patch is tested and applied [1]. The vendor has not yet published a fixed version; users should update the plugin as soon as a patch becomes available or implement the recommended mitigation [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=3.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.