Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11517: CWE-639 Authorization Bypass Through User-Controlled Key in theeventscalendar Event Tickets and Registration

0
High
VulnerabilityCVE-2025-11517cvecve-2025-11517cwe-639
Published: Sat Oct 18 2025 (10/18/2025, 06:42:43 UTC)
Source: CVE Database V5
Vendor/Project: theeventscalendar
Product: Event Tickets and Registration

Description

The Event Tickets and Registration plugin for WordPress is vulnerable to payment bypass in all versions up to, and including, 5.26.5. This is due to the /wp-json/tribe/tickets/v1/commerce/free/order endpoint not verifying that a ticket type should be free allowing the user to bypass the payment. This makes it possible for unauthenticated attackers to obtain access to paid tickets, without paying for them, causing a loss of revenue for the target.

AI-Powered Analysis

AILast updated: 10/25/2025, 09:54:32 UTC

Technical Analysis

CVE-2025-11517 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Event Tickets and Registration plugin for WordPress. The vulnerability resides in the REST API endpoint /wp-json/tribe/tickets/v1/commerce/free/order, which is intended to handle free ticket orders. However, the endpoint does not verify whether the ticket type requested is actually free, allowing attackers to manipulate the request to obtain paid tickets without completing payment. This flaw enables unauthenticated attackers to exploit the system remotely without any user interaction or privileges. The vulnerability impacts all versions up to and including 5.26.5 of the plugin. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (network vector, no privileges required, no user interaction) and the significant impact on integrity (unauthorized acquisition of paid tickets). While confidentiality and availability are not affected, the integrity breach results in financial loss and potential reputational damage for organizations relying on this plugin for event ticketing. No patches or exploit code are currently publicly available, but the vulnerability has been officially published and assigned a CVE identifier. The plugin is widely used in WordPress-based event management systems, making this a relevant threat for many organizations globally, including those in Europe.

Potential Impact

The primary impact of CVE-2025-11517 is financial, as attackers can bypass payment mechanisms to obtain paid tickets for free, directly causing revenue loss. This can also lead to reputational damage if customers or partners perceive the event organizer as having weak security controls. For European organizations, especially those hosting large-scale events or relying heavily on online ticket sales through WordPress, this vulnerability could disrupt business operations and erode trust. Additionally, unauthorized ticket acquisition could lead to overcapacity issues at events, logistical challenges, and potential safety risks. The lack of authentication and user interaction requirements increases the risk of widespread exploitation. While no known exploits are currently active, the vulnerability’s public disclosure means attackers could develop exploits rapidly. Organizations in Europe with significant event management activities, particularly in countries with high WordPress adoption, face elevated risks.

Mitigation Recommendations

1. Monitor the Event Tickets and Registration plugin vendor announcements closely and apply security patches immediately once released. 2. Until a patch is available, restrict access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules that block or rate-limit requests to /wp-json/tribe/tickets/v1/commerce/free/order from unauthenticated users. 3. Employ strict access controls and authentication mechanisms around ticket purchasing workflows to detect and prevent unauthorized ticket acquisition. 4. Enable detailed logging and monitoring of ticket order activities to identify anomalous patterns indicative of exploitation attempts. 5. Consider temporarily disabling the plugin or the ticket purchasing feature if patching or mitigation is not feasible in the short term. 6. Educate event management and IT teams about the vulnerability and encourage vigilance for suspicious ticketing activity. 7. Review and harden overall WordPress security posture, including plugin management and REST API exposure, to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-08T15:26:41.876Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f33944197c8629076f80d7

Added to database: 10/18/2025, 6:52:52 AM

Last enriched: 10/25/2025, 9:54:32 AM

Last updated: 12/4/2025, 10:47:28 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats