CVE-2024-13457: CWE-284 Improper Access Control in theeventscalendar Event Tickets and Registration
CVE-2024-13457 is a medium severity vulnerability in the Event Tickets and Registration WordPress plugin affecting all versions up to 5. 18. 1. It is caused by improper access control (CWE-284) due to missing validation of the user-controlled tc-order-id parameter. This allows unauthenticated attackers to perform an Insecure Direct Object Reference (IDOR) attack, enabling them to access order details they do not own, including ticket prices, user emails, and order dates. The vulnerability does not require authentication or user interaction and has a CVSS score of 5. 3. Although no known exploits are currently reported in the wild, the exposure of personal and transactional data poses privacy and information disclosure risks. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data access. Countries with significant WordPress usage and event management reliance are most at risk.
AI Analysis
Technical Summary
CVE-2024-13457 is an access control vulnerability identified in the Event Tickets and Registration plugin for WordPress, affecting all versions up to and including 5.18.1. The root cause is an Insecure Direct Object Reference (IDOR) vulnerability stemming from the lack of proper validation on the tc-order-id parameter, which is user-controlled. This parameter is used to retrieve order details, but without adequate authorization checks, an attacker can manipulate it to access order information belonging to other users. The exposed data includes sensitive details such as ticket prices, user email addresses, and order dates. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score is 5.3, indicating a medium severity level primarily due to confidentiality impact without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability falls under CWE-284 (Improper Access Control), highlighting a failure to enforce proper authorization policies within the plugin's code handling order data retrieval.
Potential Impact
The primary impact of CVE-2024-13457 is unauthorized disclosure of sensitive customer and transactional information. Attackers can access order details such as ticket prices and user emails without authentication, which can lead to privacy violations, potential phishing attacks, and reputational damage for affected organizations. Although the vulnerability does not allow modification or deletion of data, the exposure of personally identifiable information (PII) can have regulatory compliance implications, especially under data protection laws like GDPR or CCPA. Event organizers relying on this plugin may face customer trust erosion and potential legal consequences if exploited. The ease of exploitation and lack of authentication requirements increase the likelihood of opportunistic attacks, especially on publicly accessible WordPress sites. However, the scope is limited to sites using this specific plugin, and the impact does not extend to system integrity or availability.
Mitigation Recommendations
To mitigate CVE-2024-13457, organizations should immediately update the Event Tickets and Registration plugin to a patched version once available. In the absence of an official patch, administrators can implement the following practical measures: 1) Restrict access to order details pages by enforcing server-side authorization checks to validate that the requesting user owns the order associated with the tc-order-id parameter. 2) Employ Web Application Firewalls (WAFs) to detect and block suspicious parameter tampering attempts targeting the tc-order-id field. 3) Limit exposure of sensitive order data on publicly accessible endpoints and consider requiring user authentication for accessing order details. 4) Monitor web server logs for unusual access patterns or repeated attempts to enumerate order IDs. 5) Educate site administrators on the risks of exposing order information and encourage regular plugin updates and security audits. 6) If feasible, implement rate limiting on order detail requests to reduce the risk of automated exploitation.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, India, Brazil, South Africa
CVE-2024-13457: CWE-284 Improper Access Control in theeventscalendar Event Tickets and Registration
Description
CVE-2024-13457 is a medium severity vulnerability in the Event Tickets and Registration WordPress plugin affecting all versions up to 5. 18. 1. It is caused by improper access control (CWE-284) due to missing validation of the user-controlled tc-order-id parameter. This allows unauthenticated attackers to perform an Insecure Direct Object Reference (IDOR) attack, enabling them to access order details they do not own, including ticket prices, user emails, and order dates. The vulnerability does not require authentication or user interaction and has a CVSS score of 5. 3. Although no known exploits are currently reported in the wild, the exposure of personal and transactional data poses privacy and information disclosure risks. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data access. Countries with significant WordPress usage and event management reliance are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-13457 is an access control vulnerability identified in the Event Tickets and Registration plugin for WordPress, affecting all versions up to and including 5.18.1. The root cause is an Insecure Direct Object Reference (IDOR) vulnerability stemming from the lack of proper validation on the tc-order-id parameter, which is user-controlled. This parameter is used to retrieve order details, but without adequate authorization checks, an attacker can manipulate it to access order information belonging to other users. The exposed data includes sensitive details such as ticket prices, user email addresses, and order dates. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score is 5.3, indicating a medium severity level primarily due to confidentiality impact without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability falls under CWE-284 (Improper Access Control), highlighting a failure to enforce proper authorization policies within the plugin's code handling order data retrieval.
Potential Impact
The primary impact of CVE-2024-13457 is unauthorized disclosure of sensitive customer and transactional information. Attackers can access order details such as ticket prices and user emails without authentication, which can lead to privacy violations, potential phishing attacks, and reputational damage for affected organizations. Although the vulnerability does not allow modification or deletion of data, the exposure of personally identifiable information (PII) can have regulatory compliance implications, especially under data protection laws like GDPR or CCPA. Event organizers relying on this plugin may face customer trust erosion and potential legal consequences if exploited. The ease of exploitation and lack of authentication requirements increase the likelihood of opportunistic attacks, especially on publicly accessible WordPress sites. However, the scope is limited to sites using this specific plugin, and the impact does not extend to system integrity or availability.
Mitigation Recommendations
To mitigate CVE-2024-13457, organizations should immediately update the Event Tickets and Registration plugin to a patched version once available. In the absence of an official patch, administrators can implement the following practical measures: 1) Restrict access to order details pages by enforcing server-side authorization checks to validate that the requesting user owns the order associated with the tc-order-id parameter. 2) Employ Web Application Firewalls (WAFs) to detect and block suspicious parameter tampering attempts targeting the tc-order-id field. 3) Limit exposure of sensitive order data on publicly accessible endpoints and consider requiring user authentication for accessing order details. 4) Monitor web server logs for unusual access patterns or repeated attempts to enumerate order IDs. 5) Educate site administrators on the risks of exposing order information and encourage regular plugin updates and security audits. 6) If feasible, implement rate limiting on order detail requests to reduce the risk of automated exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-16T14:57:20.404Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e59b7ef31ef0b59eb2b
Added to database: 2/25/2026, 9:49:13 PM
Last enriched: 2/26/2026, 12:46:21 AM
Last updated: 2/26/2026, 8:29:04 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.