Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4665: CWE-639 Authorization Bypass Through User-Controlled Key in EventPrime

0
Medium
VulnerabilityCVE-2024-4665cvecve-2024-4665cwe-639
Published: Thu May 15 2025 (05/15/2025, 20:09:45 UTC)
Source: CVE
Vendor/Project: Unknown
Product: EventPrime

Description

The EventPrime WordPress plugin before 3.5.0 does not properly validate permissions when updating bookings, allowing users to change/cancel bookings for other users. Additionally, the feature is lacking a nonce.

AI-Powered Analysis

AILast updated: 11/13/2025, 21:30:24 UTC

Technical Analysis

CVE-2024-4665 is an authorization bypass vulnerability classified under CWE-639 affecting the EventPrime WordPress plugin versions before 3.5.0. The flaw arises because the plugin does not properly validate user permissions when updating bookings, allowing authenticated users with limited privileges to modify or cancel bookings that belong to other users. Additionally, the affected feature lacks a nonce, which is a security token used to prevent CSRF (Cross-Site Request Forgery) attacks, further weakening the security posture. The vulnerability requires the attacker to be authenticated (PR:L) but does not require user interaction (UI:N), and it can be exploited remotely over the network (AV:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact affects confidentiality and integrity to a limited extent (C:L, I:L) but does not impact availability (A:N). The absence of nonce protection increases the risk of CSRF attacks, potentially allowing attackers to perform unauthorized booking changes on behalf of other users. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on EventPrime for event booking management, as unauthorized booking modifications can lead to data leakage, privacy violations, and operational disruptions in event scheduling. The vulnerability was published on May 15, 2025, and has a CVSS v3.1 score of 6.4, indicating a medium severity level. The vendor has not yet provided patch links, so organizations should monitor for updates and apply them promptly once available.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized access and modification of booking data within the EventPrime plugin, potentially exposing personal information of attendees and disrupting event management workflows. This can result in privacy breaches under GDPR regulations, reputational damage, and operational inefficiencies. Organizations that rely heavily on EventPrime for managing events, conferences, or appointments may face risks of unauthorized cancellations or modifications, impacting customer trust and service reliability. Since the vulnerability requires authentication, insider threats or compromised user accounts pose a significant risk. The lack of nonce protection also increases the risk of CSRF attacks, which could be exploited through social engineering or phishing campaigns targeting authenticated users. The impact is particularly critical for sectors with strict data protection requirements such as healthcare, education, and government agencies in Europe. Additionally, event organizers and businesses in the hospitality and tourism industries could experience financial losses and customer dissatisfaction due to booking tampering.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if EventPrime plugin versions prior to 3.5.0 are in use. Until a patch is released, restrict plugin access to trusted users only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised accounts. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting booking update endpoints. Review and tighten user roles and permissions within WordPress to ensure minimal privilege principles are enforced. Monitor logs for unusual booking modification activities and conduct regular security assessments of the plugin. Once available, promptly update the EventPrime plugin to version 3.5.0 or later, which should include proper permission validation and nonce implementation. Additionally, consider deploying CSRF protection mechanisms at the application or server level if plugin updates are delayed. Educate users about phishing risks to prevent credential compromise that could facilitate exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-05-08T21:49:28.855Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe1c

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 11/13/2025, 9:30:24 PM

Last updated: 11/22/2025, 8:13:27 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats