CVE-2024-1124: CWE-862 Missing Authorization in metagauss EventPrime – Events Calendar, Bookings and Tickets
CVE-2024-1124 is a medium severity vulnerability in the EventPrime – Events Calendar, Bookings and Tickets WordPress plugin that allows authenticated users with subscriber-level access or higher to send arbitrary emails from the affected site. The root cause is a missing authorization check in the ep_send_attendees_email() function, enabling unauthorized email sending without proper capability verification. This flaw does not impact confidentiality or availability but can be exploited to send phishing or spam emails appearing to originate from the compromised site. Exploitation requires authentication but no user interaction beyond login. No known public exploits exist yet, and all plugin versions up to 3. 4. 1 are affected. Organizations using this plugin should promptly update or implement access restrictions to mitigate risks. Countries with high WordPress usage and significant adoption of this plugin are most at risk, including the United States, India, Brazil, Germany, and the United Kingdom.
AI Analysis
Technical Summary
CVE-2024-1124 is a vulnerability identified in the EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress, affecting all versions up to and including 3.4.1. The vulnerability arises from a missing authorization check (CWE-862) in the ep_send_attendees_email() function, which is responsible for sending emails to event attendees. Due to the lack of proper capability verification, any authenticated user with subscriber-level privileges or higher can invoke this function to send arbitrary emails with arbitrary content from the compromised WordPress site. This flaw does not require user interaction beyond authentication and can be exploited remotely over the network. The vulnerability has a CVSS 3.1 base score of 4.3 (medium severity), reflecting its limited impact on confidentiality (no data disclosure), integrity (possible email content manipulation), and no impact on availability. The attack vector is network-based with low attack complexity and requires low privileges but no user interaction. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged for phishing campaigns, spam distribution, or social engineering attacks that appear to originate from a trusted domain. The plugin is widely used in WordPress environments for event management, making this vulnerability relevant to organizations relying on this plugin for their event communications. The absence of a patch at the time of reporting necessitates immediate mitigation steps to prevent exploitation.
Potential Impact
The primary impact of CVE-2024-1124 is the unauthorized sending of arbitrary emails from a legitimate WordPress site, which can severely damage an organization's reputation and trustworthiness. Attackers can exploit this to conduct phishing campaigns, distribute malware, or perform social engineering attacks that appear credible because the emails originate from a trusted domain. Although the vulnerability does not directly expose sensitive data or disrupt service availability, the indirect consequences can be significant, including potential credential theft, malware infections, and regulatory compliance issues related to email misuse. Organizations using the affected plugin may face increased spam complaints, blacklisting of their email domains, and loss of customer confidence. The requirement for authenticated access limits exploitation to users who already have some level of access, but subscriber-level accounts are common and often not tightly controlled, increasing the attack surface. This vulnerability is particularly impactful for organizations that rely heavily on email communications for event management and customer engagement.
Mitigation Recommendations
To mitigate CVE-2024-1124, organizations should immediately update the EventPrime plugin to a patched version once available from the vendor. Until a patch is released, administrators should restrict subscriber-level and other low-privilege user accounts from accessing or triggering the email sending functionality, possibly by disabling or limiting plugin features via role management plugins or custom code. Implement strict user account management policies, including regular review and removal of unnecessary subscriber accounts. Monitoring outgoing emails for unusual volume or content can help detect exploitation attempts early. Additionally, organizations should educate users about phishing risks and implement email authentication mechanisms such as SPF, DKIM, and DMARC to reduce the impact of malicious emails sent from compromised accounts. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function may provide temporary protection. Finally, maintain regular backups and incident response plans to quickly address any compromise resulting from exploitation.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Italy, Spain
CVE-2024-1124: CWE-862 Missing Authorization in metagauss EventPrime – Events Calendar, Bookings and Tickets
Description
CVE-2024-1124 is a medium severity vulnerability in the EventPrime – Events Calendar, Bookings and Tickets WordPress plugin that allows authenticated users with subscriber-level access or higher to send arbitrary emails from the affected site. The root cause is a missing authorization check in the ep_send_attendees_email() function, enabling unauthorized email sending without proper capability verification. This flaw does not impact confidentiality or availability but can be exploited to send phishing or spam emails appearing to originate from the compromised site. Exploitation requires authentication but no user interaction beyond login. No known public exploits exist yet, and all plugin versions up to 3. 4. 1 are affected. Organizations using this plugin should promptly update or implement access restrictions to mitigate risks. Countries with high WordPress usage and significant adoption of this plugin are most at risk, including the United States, India, Brazil, Germany, and the United Kingdom.
AI-Powered Analysis
Technical Analysis
CVE-2024-1124 is a vulnerability identified in the EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress, affecting all versions up to and including 3.4.1. The vulnerability arises from a missing authorization check (CWE-862) in the ep_send_attendees_email() function, which is responsible for sending emails to event attendees. Due to the lack of proper capability verification, any authenticated user with subscriber-level privileges or higher can invoke this function to send arbitrary emails with arbitrary content from the compromised WordPress site. This flaw does not require user interaction beyond authentication and can be exploited remotely over the network. The vulnerability has a CVSS 3.1 base score of 4.3 (medium severity), reflecting its limited impact on confidentiality (no data disclosure), integrity (possible email content manipulation), and no impact on availability. The attack vector is network-based with low attack complexity and requires low privileges but no user interaction. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged for phishing campaigns, spam distribution, or social engineering attacks that appear to originate from a trusted domain. The plugin is widely used in WordPress environments for event management, making this vulnerability relevant to organizations relying on this plugin for their event communications. The absence of a patch at the time of reporting necessitates immediate mitigation steps to prevent exploitation.
Potential Impact
The primary impact of CVE-2024-1124 is the unauthorized sending of arbitrary emails from a legitimate WordPress site, which can severely damage an organization's reputation and trustworthiness. Attackers can exploit this to conduct phishing campaigns, distribute malware, or perform social engineering attacks that appear credible because the emails originate from a trusted domain. Although the vulnerability does not directly expose sensitive data or disrupt service availability, the indirect consequences can be significant, including potential credential theft, malware infections, and regulatory compliance issues related to email misuse. Organizations using the affected plugin may face increased spam complaints, blacklisting of their email domains, and loss of customer confidence. The requirement for authenticated access limits exploitation to users who already have some level of access, but subscriber-level accounts are common and often not tightly controlled, increasing the attack surface. This vulnerability is particularly impactful for organizations that rely heavily on email communications for event management and customer engagement.
Mitigation Recommendations
To mitigate CVE-2024-1124, organizations should immediately update the EventPrime plugin to a patched version once available from the vendor. Until a patch is released, administrators should restrict subscriber-level and other low-privilege user accounts from accessing or triggering the email sending functionality, possibly by disabling or limiting plugin features via role management plugins or custom code. Implement strict user account management policies, including regular review and removal of unnecessary subscriber accounts. Monitoring outgoing emails for unusual volume or content can help detect exploitation attempts early. Additionally, organizations should educate users about phishing risks and implement email authentication mechanisms such as SPF, DKIM, and DMARC to reduce the impact of malicious emails sent from compromised accounts. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function may provide temporary protection. Finally, maintain regular backups and incident response plans to quickly address any compromise resulting from exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-01-31T14:07:51.809Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d22b7ef31ef0b56e3b7
Added to database: 2/25/2026, 9:44:02 PM
Last enriched: 2/26/2026, 9:16:31 AM
Last updated: 2/26/2026, 9:36:22 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.