CVE-2024-4665: CWE-639 Authorization Bypass Through User-Controlled Key in EventPrime
The EventPrime WordPress plugin before 3.5.0 does not properly validate permissions when updating bookings, allowing users to change/cancel bookings for other users. Additionally, the feature is lacking a nonce.
AI Analysis
Technical Summary
CVE-2024-4665 is an authorization bypass vulnerability classified under CWE-639 affecting the EventPrime WordPress plugin versions before 3.5.0. The flaw arises because the plugin does not properly validate user permissions when updating bookings, allowing authenticated users with limited privileges to modify or cancel bookings that belong to other users. Additionally, the affected feature lacks a nonce, which is a security token used to prevent CSRF (Cross-Site Request Forgery) attacks, further weakening the security posture. The vulnerability requires the attacker to be authenticated (PR:L) but does not require user interaction (UI:N), and it can be exploited remotely over the network (AV:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact affects confidentiality and integrity to a limited extent (C:L, I:L) but does not impact availability (A:N). The absence of nonce protection increases the risk of CSRF attacks, potentially allowing attackers to perform unauthorized booking changes on behalf of other users. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on EventPrime for event booking management, as unauthorized booking modifications can lead to data leakage, privacy violations, and operational disruptions in event scheduling. The vulnerability was published on May 15, 2025, and has a CVSS v3.1 score of 6.4, indicating a medium severity level. The vendor has not yet provided patch links, so organizations should monitor for updates and apply them promptly once available.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized access and modification of booking data within the EventPrime plugin, potentially exposing personal information of attendees and disrupting event management workflows. This can result in privacy breaches under GDPR regulations, reputational damage, and operational inefficiencies. Organizations that rely heavily on EventPrime for managing events, conferences, or appointments may face risks of unauthorized cancellations or modifications, impacting customer trust and service reliability. Since the vulnerability requires authentication, insider threats or compromised user accounts pose a significant risk. The lack of nonce protection also increases the risk of CSRF attacks, which could be exploited through social engineering or phishing campaigns targeting authenticated users. The impact is particularly critical for sectors with strict data protection requirements such as healthcare, education, and government agencies in Europe. Additionally, event organizers and businesses in the hospitality and tourism industries could experience financial losses and customer dissatisfaction due to booking tampering.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if EventPrime plugin versions prior to 3.5.0 are in use. Until a patch is released, restrict plugin access to trusted users only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised accounts. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting booking update endpoints. Review and tighten user roles and permissions within WordPress to ensure minimal privilege principles are enforced. Monitor logs for unusual booking modification activities and conduct regular security assessments of the plugin. Once available, promptly update the EventPrime plugin to version 3.5.0 or later, which should include proper permission validation and nonce implementation. Additionally, consider deploying CSRF protection mechanisms at the application or server level if plugin updates are delayed. Educate users about phishing risks to prevent credential compromise that could facilitate exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-4665: CWE-639 Authorization Bypass Through User-Controlled Key in EventPrime
Description
The EventPrime WordPress plugin before 3.5.0 does not properly validate permissions when updating bookings, allowing users to change/cancel bookings for other users. Additionally, the feature is lacking a nonce.
AI-Powered Analysis
Technical Analysis
CVE-2024-4665 is an authorization bypass vulnerability classified under CWE-639 affecting the EventPrime WordPress plugin versions before 3.5.0. The flaw arises because the plugin does not properly validate user permissions when updating bookings, allowing authenticated users with limited privileges to modify or cancel bookings that belong to other users. Additionally, the affected feature lacks a nonce, which is a security token used to prevent CSRF (Cross-Site Request Forgery) attacks, further weakening the security posture. The vulnerability requires the attacker to be authenticated (PR:L) but does not require user interaction (UI:N), and it can be exploited remotely over the network (AV:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact affects confidentiality and integrity to a limited extent (C:L, I:L) but does not impact availability (A:N). The absence of nonce protection increases the risk of CSRF attacks, potentially allowing attackers to perform unauthorized booking changes on behalf of other users. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on EventPrime for event booking management, as unauthorized booking modifications can lead to data leakage, privacy violations, and operational disruptions in event scheduling. The vulnerability was published on May 15, 2025, and has a CVSS v3.1 score of 6.4, indicating a medium severity level. The vendor has not yet provided patch links, so organizations should monitor for updates and apply them promptly once available.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized access and modification of booking data within the EventPrime plugin, potentially exposing personal information of attendees and disrupting event management workflows. This can result in privacy breaches under GDPR regulations, reputational damage, and operational inefficiencies. Organizations that rely heavily on EventPrime for managing events, conferences, or appointments may face risks of unauthorized cancellations or modifications, impacting customer trust and service reliability. Since the vulnerability requires authentication, insider threats or compromised user accounts pose a significant risk. The lack of nonce protection also increases the risk of CSRF attacks, which could be exploited through social engineering or phishing campaigns targeting authenticated users. The impact is particularly critical for sectors with strict data protection requirements such as healthcare, education, and government agencies in Europe. Additionally, event organizers and businesses in the hospitality and tourism industries could experience financial losses and customer dissatisfaction due to booking tampering.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if EventPrime plugin versions prior to 3.5.0 are in use. Until a patch is released, restrict plugin access to trusted users only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised accounts. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting booking update endpoints. Review and tighten user roles and permissions within WordPress to ensure minimal privilege principles are enforced. Monitor logs for unusual booking modification activities and conduct regular security assessments of the plugin. Once available, promptly update the EventPrime plugin to version 3.5.0 or later, which should include proper permission validation and nonce implementation. Additionally, consider deploying CSRF protection mechanisms at the application or server level if plugin updates are delayed. Educate users about phishing risks to prevent credential compromise that could facilitate exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-05-08T21:49:28.855Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebe1c
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 11/13/2025, 9:30:24 PM
Last updated: 11/22/2025, 8:13:27 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.