Vulnerabilites related to imithemes - Eventer - WordPress Event & Booking Manager Plugin
CVE-2024-11132 (GCVE-0-2024-11132)
Vulnerability from cvelistv5
Published
2025-02-03 19:22
Modified
2025-02-03 20:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
The Eventer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.9.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
imithemes | Eventer - WordPress Event & Booking Manager Plugin |
Version: * ≤ 3.9.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11132", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T20:19:50.298130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-03T20:19:57.879Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Eventer - WordPress Event \u0026 Booking Manager Plugin", "vendor": "imithemes", "versions": [ { "lessThanOrEqual": "3.9.9", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Istv\u00e1n M\u00e1rton" } ], "descriptions": [ { "lang": "en", "value": "The Eventer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.9.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-03T19:22:48.750Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b747d61-4528-485e-b746-6dddc64485b5?source=cve" }, { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534" } ], "timeline": [ { "lang": "en", "time": "2024-11-12T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2024-11-12T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2025-02-03T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Eventer \u003c= 3.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-11132", "datePublished": "2025-02-03T19:22:48.750Z", "dateReserved": "2024-11-12T09:35:36.961Z", "dateUpdated": "2025-02-03T20:19:57.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-10799 (GCVE-0-2024-10799)
Vulnerability from cvelistv5
Published
2025-01-17 05:29
Modified
2025-02-12 16:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
The Eventer plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.9.7 via the eventer_woo_download_tickets() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
imithemes | Eventer - WordPress Event & Booking Manager Plugin |
Version: * ≤ 3.9.7 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-10799", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-17T13:37:35.433787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T16:50:57.566Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Eventer - WordPress Event \u0026 Booking Manager Plugin", "vendor": "imithemes", "versions": [ { "lessThanOrEqual": "3.9.7", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Tonn" } ], "descriptions": [ { "lang": "en", "value": "The Eventer plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.9.7 via the eventer_woo_download_tickets() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-17T05:29:27.786Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aea5f970-243f-4642-83e1-34db11c4ca63?source=cve" }, { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534" } ], "timeline": [ { "lang": "en", "time": "2025-01-16T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Eventer \u003c= 3.9.7 - Authenticated (Subscriber+) Arbitrary File Read" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-10799", "datePublished": "2025-01-17T05:29:27.786Z", "dateReserved": "2024-11-04T16:15:49.806Z", "dateUpdated": "2025-02-12T16:50:57.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11134 (GCVE-0-2024-11134)
Vulnerability from cvelistv5
Published
2025-02-03 19:22
Modified
2025-02-03 20:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
The Eventer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'eventer_export_bookings_csv' function in all versions up to, and including, 3.9.9. This makes it possible for authenticated attackers with subscriber-level permissions or above, to download bookings, which contains customers' personal data.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
imithemes | Eventer - WordPress Event & Booking Manager Plugin |
Version: * ≤ 3.9.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11134", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T20:19:25.716739Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-03T20:19:33.435Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Eventer - WordPress Event \u0026 Booking Manager Plugin", "vendor": "imithemes", "versions": [ { "lessThanOrEqual": "3.9.9", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Istv\u00e1n M\u00e1rton" } ], "descriptions": [ { "lang": "en", "value": "The Eventer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the \u0027eventer_export_bookings_csv\u0027 function in all versions up to, and including, 3.9.9. This makes it possible for authenticated attackers with subscriber-level permissions or above, to download bookings, which contains customers\u0027 personal data." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-03T19:22:49.151Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/476bc092-c623-4caf-9676-3036d27c4840?source=cve" }, { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534" } ], "timeline": [ { "lang": "en", "time": "2024-11-12T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2024-11-12T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2025-02-03T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Eventer \u003c= 3.9.9 - Missing Authorization to Authenticated (Subscriber+) Bookings Export" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-11134", "datePublished": "2025-02-03T19:22:49.151Z", "dateReserved": "2024-11-12T10:40:28.007Z", "dateUpdated": "2025-02-03T20:19:33.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11133 (GCVE-0-2024-11133)
Vulnerability from cvelistv5
Published
2025-02-03 19:22
Modified
2025-02-03 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
The Eventer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'handle_pdf_download_request' function in all versions up to, and including, 3.9.9. This makes it possible for unauthenticated attackers to download event tickets.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
imithemes | Eventer - WordPress Event & Booking Manager Plugin |
Version: * ≤ 3.9.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11133", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T20:20:12.107032Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-03T20:20:23.474Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Eventer - WordPress Event \u0026 Booking Manager Plugin", "vendor": "imithemes", "versions": [ { "lessThanOrEqual": "3.9.9", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Istv\u00e1n M\u00e1rton" } ], "descriptions": [ { "lang": "en", "value": "The Eventer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the \u0027handle_pdf_download_request\u0027 function in all versions up to, and including, 3.9.9. This makes it possible for unauthenticated attackers to download event tickets." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-03T19:22:43.870Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d78b823-fdff-41b2-8059-6564e3eb668d?source=cve" }, { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534" } ], "timeline": [ { "lang": "en", "time": "2024-11-12T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2024-11-12T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2025-02-03T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Eventer \u003c= 3.9.9 - Missing Authorization to Unauthenticated Event Ticket Download" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-11133", "datePublished": "2025-02-03T19:22:43.870Z", "dateReserved": "2024-11-12T10:32:19.526Z", "dateUpdated": "2025-02-03T20:20:23.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-0959 (GCVE-0-2025-0959)
Vulnerability from cvelistv5
Published
2025-03-07 08:21
Modified
2025-03-07 15:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-564 - SQL Injection: Hibernate
Summary
The Eventer - WordPress Event & Booking Manager Plugin plugin for WordPress is vulnerable to SQL Injection via the reg_id parameter in all versions up to, and including, 3.9.9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
imithemes | Eventer - WordPress Event & Booking Manager Plugin |
Version: * ≤ 3.9.9.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0959", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-07T15:08:32.498294Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-07T15:10:00.432Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Eventer - WordPress Event \u0026 Booking Manager Plugin", "vendor": "imithemes", "versions": [ { "lessThanOrEqual": "3.9.9.2", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Lucio S\u00e1" } ], "descriptions": [ { "lang": "en", "value": "The Eventer - WordPress Event \u0026 Booking Manager Plugin plugin for WordPress is vulnerable to SQL Injection via the reg_id parameter in all versions up to, and including, 3.9.9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-564", "description": "CWE-564 SQL Injection: Hibernate", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-07T08:21:27.417Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bd42c89e-57db-458f-910c-404a5615f280?source=cve" }, { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534" } ], "timeline": [ { "lang": "en", "time": "2025-03-06T19:34:20.000+00:00", "value": "Disclosed" } ], "title": "Eventer - WordPress Event \u0026 Booking Manager Plugin \u003c= 3.9.9.2 - Authenticated (Subscriber+) SQL Injection via reg_id" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2025-0959", "datePublished": "2025-03-07T08:21:27.417Z", "dateReserved": "2025-01-31T21:54:05.021Z", "dateUpdated": "2025-03-07T15:10:00.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11135 (GCVE-0-2024-11135)
Vulnerability from cvelistv5
Published
2025-01-28 04:21
Modified
2025-01-28 15:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
The Eventer plugin for WordPress is vulnerable to SQL Injection via the 'event' parameter in the 'eventer_get_attendees' function in all versions up to, and including, 3.9.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
imithemes | Eventer - WordPress Event & Booking Manager Plugin |
Version: * ≤ 3.9.8 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11135", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:09:54.165547Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:10:05.746Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Eventer - WordPress Event \u0026 Booking Manager Plugin", "vendor": "imithemes", "versions": [ { "lessThanOrEqual": "3.9.8", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Istv\u00e1n M\u00e1rton" } ], "descriptions": [ { "lang": "en", "value": "The Eventer plugin for WordPress is vulnerable to SQL Injection via the \u0027event\u0027 parameter in the \u0027eventer_get_attendees\u0027 function in all versions up to, and including, 3.9.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T04:21:32.872Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8dc0712-f78e-46c5-a0d1-2db752498d54?source=cve" }, { "url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534" } ], "timeline": [ { "lang": "en", "time": "2024-11-12T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2024-11-12T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2025-01-27T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "Eventer \u003c= 3.9.8 - Unauthenticated SQL Injection" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-11135", "datePublished": "2025-01-28T04:21:32.872Z", "dateReserved": "2024-11-12T11:16:21.868Z", "dateUpdated": "2025-01-28T15:10:05.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }