Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.4

WordPress My Calendar Plugin Allows Attackers to Inject Malicious Code

CVE-2026-2355
Summary

The My Calendar plugin for WordPress is at risk of being compromised by attackers who can inject malicious code into the plugin's pages. This could happen if an attacker with contributor-level access or higher edits the plugin's settings. To protect your site, update the plugin to a version older than 3.7.3 or remove and reinstall it.

Original title
The My Calendar – Accessible Event Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template` attribute of the `[my_calendar_upcoming]` shortcode in all versions u...
Original description
The My Calendar – Accessible Event Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template` attribute of the `[my_calendar_upcoming]` shortcode in all versions up to, and including, 3.7.3. This is due to the use of `stripcslashes()` on user-supplied shortcode attribute values in the `mc_draw_template()` function, which decodes C-style hex escape sequences (e.g., `\x3c` to `<`) at render time, bypassing WordPress's `wp_kses_post()` content sanitization that runs at save time. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
nvd CVSS3.1 6.4
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026