Security for everyone

CVE-2020-26153 Scanner

Detects 'Cross-Site Scripting (XSS)' vulnerability in Event Espresso Core plugin for WordPress affects v. before 4.10.7.p.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2020-26153 Scanner Detail

Event Espresso Core plugin for WordPress is an open-source event management plugin that provides easy registration and ticket management for events. This WordPress plugin provides a complete event management system, which includes registration, ticketing, event promotion, email reminders, event check-in, seating chart, and more. A popular plugin, its features have helped many businesses and event organizers manage their events with ease.

However, the CVE-2020-26153 vulnerability poses a threat to the users of the Event Espresso Core plugin. This vulnerability exists due to a cross-site scripting (XSS) flaw in the plugin's ee_msg_admin_overview.template.php file. It allows attackers to inject and execute arbitrary scripts or HTML code on the website via the page parameter.

Exploiting this vulnerability can lead to severe consequences, as it allows attackers to gain unauthorized access to the website's content and users' sensitive data, including login credentials and payment information. Attackers with such access can easily infiltrate the website and manipulate it, causing reputational damage, financial loss, and data breaches.

Lastly, Security For Everyone is proud to offer its state-of-the-art vulnerability scanning and monitoring service to all individuals and businesses. The pro features provide comprehensive scans of websites, web applications, networks, and APIs to detect all known vulnerabilities. Users can rest assured that their digital assets are protected against all types of cyberattacks, including XSS attacks such as CVE-2020-26153. Subscribe today to stay ahead of the curve and prevent potential attacks before they occur.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture