Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13216: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in devitemsllc HT Event – WordPress Event Manager Plugin for Elementor

0
Medium
VulnerabilityCVE-2024-13216cvecve-2024-13216cwe-359
Published: Fri Jan 31 2025 (01/31/2025, 05:22:32 UTC)
Source: CVE Database V5
Vendor/Project: devitemsllc
Product: HT Event – WordPress Event Manager Plugin for Elementor

Description

CVE-2024-13216 is a medium severity vulnerability in the HT Event – WordPress Event Manager Plugin for Elementor affecting all versions up to 1. 4. 7. It allows authenticated users with Contributor-level access or higher to extract sensitive private, pending, scheduled, and draft template data via the 'render' function in the htevent_sponsor. php file. The vulnerability results from improper access control leading to exposure of private personal information (CWE-359). Exploitation requires no user interaction but does require authenticated access with limited privileges. There are no known exploits in the wild currently, and no patches have been published yet. The CVSS score is 4. 3, reflecting a low complexity attack vector but limited impact confined to confidentiality.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:15:49 UTC

Technical Analysis

CVE-2024-13216 is a vulnerability identified in the HT Event – WordPress Event Manager Plugin for Elementor, specifically in all versions up to and including 1.4.7. The flaw resides in the 'render' function within the /includes/widgets/htevent_sponsor.php file, where insufficient access control allows authenticated users with Contributor-level permissions or higher to access sensitive private information. This includes private, pending, scheduled, and draft template data that should normally be restricted. The vulnerability is classified under CWE-359, indicating exposure of private personal information to unauthorized actors. The attack vector is network-based (remote), requiring low attack complexity and no user interaction, but it does require the attacker to be authenticated with at least Contributor privileges. The vulnerability does not impact integrity or availability but compromises confidentiality by leaking sensitive data. No patches or fixes have been released at the time of publication, and no active exploitation has been reported. The CVSS v3.1 base score is 4.3, reflecting a medium severity rating. The vulnerability affects all versions of the plugin up to 1.4.7, which is widely used in WordPress sites that manage events using Elementor page builder. The exposure of draft and scheduled templates could lead to leakage of sensitive event-related information or personal data, potentially aiding further attacks or privacy violations.

Potential Impact

The primary impact of CVE-2024-13216 is the unauthorized disclosure of sensitive private information stored within the WordPress Event Manager Plugin templates. Organizations using this plugin risk leakage of confidential event data, including unpublished or draft event details that could contain personal or proprietary information. This exposure could facilitate social engineering, targeted phishing, or reputational damage if sensitive event plans or personal data are leaked. Although the vulnerability requires authenticated access at Contributor level or above, many WordPress sites allow such roles to external users or contributors, increasing the risk surface. The vulnerability does not affect system integrity or availability, but the confidentiality breach can undermine trust and compliance with data protection regulations such as GDPR. For organizations relying on this plugin for event management, especially those handling sensitive or private events, the risk is significant. The absence of a patch increases the window of exposure until a fix is released. Attackers with limited privileges can escalate their information gathering capabilities, potentially leading to further exploitation or privilege escalation.

Mitigation Recommendations

To mitigate CVE-2024-13216, organizations should immediately audit and restrict Contributor-level access to trusted users only, minimizing the number of users with permissions that allow exploitation. Implement strict role-based access controls and review user roles regularly to ensure no unnecessary privileges are granted. Disable or remove the HT Event – WordPress Event Manager Plugin for Elementor if it is not essential, or replace it with alternative event management plugins that have no known vulnerabilities. Monitor WordPress site logs for unusual access patterns or attempts to access sensitive template data. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable 'render' function or related endpoints. Stay informed about vendor updates and apply patches promptly once released. Additionally, consider implementing content security policies and data encryption for sensitive event data stored within WordPress. Conduct regular security assessments and penetration testing focusing on plugin vulnerabilities and access control weaknesses. Finally, educate contributors and users about the risks of privilege misuse and enforce strong authentication mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-08T17:53:52.031Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4eb7ef31ef0b59c9b4

Added to database: 2/25/2026, 9:49:02 PM

Last enriched: 2/26/2026, 2:15:49 AM

Last updated: 2/26/2026, 7:52:09 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats