Skip to main content

CVE-2024-4665: CWE-284 Improper Access Control in Unknown EventPrime

Medium
VulnerabilityCVE-2024-4665cvecve-2024-4665cwe-284
Published: Thu May 15 2025 (05/15/2025, 20:09:45 UTC)
Source: CVE
Vendor/Project: Unknown
Product: EventPrime

Description

The EventPrime WordPress plugin before 3.5.0 does not properly validate permissions when updating bookings, allowing users to change/cancel bookings for other users. Additionally, the feature is lacking a nonce.

AI-Powered Analysis

AILast updated: 07/04/2025, 17:10:44 UTC

Technical Analysis

CVE-2024-4665 is a medium-severity vulnerability affecting the EventPrime WordPress plugin versions prior to 3.5.0, specifically version 3.4.9. The vulnerability arises from improper access control (CWE-284) when updating bookings within the plugin. Due to insufficient permission validation, an unauthenticated attacker can change or cancel bookings belonging to other users. Furthermore, the affected feature lacks a nonce, which is a security token used to prevent Cross-Site Request Forgery (CSRF) attacks. The CVSS 3.1 base score is 5.3, indicating a medium impact, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:L), with no confidentiality or integrity impact. This means an attacker can disrupt booking availability but cannot read or modify booking data beyond cancellation or changes. No known exploits are currently reported in the wild. The vulnerability is significant because it allows unauthorized manipulation of booking data, potentially causing service disruption or denial of service for legitimate users. Since EventPrime is a WordPress plugin used for event booking management, websites relying on it for scheduling and reservations are at risk of unauthorized booking cancellations or modifications. The lack of nonce protection also increases the risk of CSRF attacks, where attackers could trick authenticated users into performing unwanted actions. The vulnerability was published on May 15, 2025, and no official patches or updates are linked yet, but upgrading to version 3.5.0 or later is implied to resolve the issue.

Potential Impact

For European organizations, this vulnerability could disrupt business operations that depend on EventPrime for event management, ticketing, or appointment scheduling. Unauthorized booking cancellations or changes could lead to customer dissatisfaction, loss of revenue, and reputational damage. Organizations in sectors such as education, entertainment, hospitality, and professional services that use WordPress with EventPrime are particularly vulnerable. The disruption of availability could also affect critical event coordination, leading to operational inefficiencies. Although the vulnerability does not expose sensitive data or allow privilege escalation, the ability to interfere with booking availability can be exploited for sabotage or competitive advantage. Additionally, the lack of nonce protection increases the risk of CSRF attacks, which could be leveraged in targeted phishing or social engineering campaigns against European users. The medium severity rating suggests that while the threat is not critical, it should be addressed promptly to avoid service disruption and maintain trust with customers and partners.

Mitigation Recommendations

European organizations should immediately verify if their WordPress sites use the EventPrime plugin, particularly version 3.4.9 or earlier. The primary mitigation is to upgrade the plugin to version 3.5.0 or later once available, as this version addresses the improper access control and nonce issues. Until an official patch is applied, organizations can implement the following specific mitigations: 1) Restrict access to booking management pages to authenticated and authorized users only, using WordPress role and capability settings. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to modify bookings without proper authentication. 3) Monitor logs for unusual booking changes or cancellations that could indicate exploitation attempts. 4) Educate users and administrators about phishing and social engineering risks related to CSRF attacks. 5) If feasible, temporarily disable the booking update feature or restrict it to trusted IP addresses to reduce exposure. 6) Implement additional nonce or token validation at the application or server level as a temporary workaround. These targeted mitigations go beyond generic advice by focusing on access control hardening, monitoring, and compensating controls until the plugin is updated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-05-08T21:49:28.855Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe1c

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 5:10:44 PM

Last updated: 8/15/2025, 2:39:06 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats