Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 14 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Strix-bubol5
Strix-bubol5 holiday Class Post Calendar Wordpress Wordpress wordpress |
|
| Vendors & Products |
Strix-bubol5
Strix-bubol5 holiday Class Post Calendar Wordpress Wordpress wordpress |
Tue, 11 Nov 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Holiday class post calendar plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.1 via the 'contents' parameter. This is due to a lack of sanitization of user-supplied data when creating a cache file. This makes it possible for unauthenticated attackers to execute code on the server. | |
| Title | Holiday class post calendar <= 7.1 - Unauthenticated Remote Code Execution via 'contents' | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:03:22.550Z
Reserved: 2025-11-06T16:32:17.929Z
Link: CVE-2025-12813
Updated: 2025-11-14T15:25:23.270Z
Status : Deferred
Published: 2025-11-11T04:15:50.413
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-12813
No data.
OpenCVE Enrichment
Updated: 2026-04-21T18:30:27Z