VYPR
High severity7.1NVD Advisory· Published Feb 20, 2026· Updated Apr 15, 2026

CVE-2025-69384

CVE-2025-69384

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdiscover Timeline Event History timeline-event-history allows Reflected XSS.This issue affects Timeline Event History: from n/a through <= 3.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in the Timeline Event History WordPress plugin through version 3.2 allows attackers to inject malicious scripts via unneutralized user input.

Vulnerability

Overview

The Timeline Event History plugin for WordPress versions 3.2 and earlier suffers from a reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user input during web page generation [1]. The vulnerability occurs when the plugin fails to sanitize or encode user-supplied data before including it in the page output, allowing attacker-controlled script code to execute in the context of the victim's browser [1].

Attack

Vector and Prerequisites

Exploitation requires user interaction: a victim (such as an administrator or another privileged user) must click a crafted link, visit a specially prepared page, or submit a malicious form [1]. No authentication is needed to deliver the payload, but the target user's session is required for the injected script to execute within the WordPress admin area. This pattern is commonly used in mass-exploit campaigns targeting WordPress plugins [1].

Impact

Successful exploitation allows an attacker to inject arbitrary HTML and JavaScript payloads [1]. This can lead to session hijacking, defacement, redirection to malicious sites, or theft of sensitive information visible during the victim's session. The CVSS v3 score is 7.1 (High), reflecting the potential for widespread automated attacks [1].

Mitigation

Status

Patchstack has released a mitigation rule that blocks attacks against this vulnerability until an official patch is tested and applied [1]. The vendor has not yet published a fixed version; users should update the plugin as soon as a patch becomes available or implement the recommended mitigation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.