Unauthorized Data Modification in Eventin Plugin for WordPress
CVE-2025-1766
5.3MEDIUM
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 20 March 2025
Summary
The Eventin plugin for WordPress suffers from a vulnerability that allows unauthorized users to manipulate data. This issue stems from a missing capability check in the 'payment_complete' function, which is present in all versions up to and including 4.0.24. As a result, unauthenticated attackers can change the status of ticket payments to 'completed', potentially leading to significant financial repercussions for businesses relying on this plugin.
Affected Version(s)
Eventin – Event Manager, Events Calendar, Event Tickets and Registrations * <= 4.0.24
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
wesley