Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12192: CWE-697 Incorrect Comparison in stellarwp The Events Calendar

0
Medium
VulnerabilityCVE-2025-12192cvecve-2025-12192cwe-697
Published: Wed Nov 05 2025 (11/05/2025, 09:27:40 UTC)
Source: CVE Database V5
Vendor/Project: stellarwp
Product: The Events Calendar

Description

The Events Calendar plugin for WordPress is vulnerable to information disclosure in versions up to, and including, 6.15.9. The sysinfo REST endpoint compares the provided key to the stored opt-in key using a loose comparison, allowing unauthenticated attackers to send a boolean value and obtain the full system report whenever "Yes, automatically share my system information with The Events Calendar support team" setting is enabled.

AI-Powered Analysis

AILast updated: 11/05/2025, 09:53:07 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12192 affects The Events Calendar plugin for WordPress, versions up to and including 6.15.9. The root cause is an incorrect comparison logic (CWE-697) in the plugin's sysinfo REST endpoint, which compares a provided key to a stored opt-in key using a loose equality check. This loose comparison allows an attacker to send a boolean value (e.g., false or true) instead of the expected key string, bypassing authentication checks. When the plugin's setting "Yes, automatically share my system information with The Events Calendar support team" is enabled, this flaw allows unauthenticated remote attackers to retrieve the full system report. This report may contain sensitive system information that could aid further attacks or reconnaissance. The vulnerability is remotely exploitable without any user interaction or privileges, and it does not impact system integrity or availability, only confidentiality. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation and the limited impact scope. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The flaw stems from improper use of loose comparison operators in PHP, which can cause unexpected truthy or falsy evaluations, a common programming pitfall leading to security issues.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of system information from WordPress sites using The Events Calendar plugin with the affected versions and the opt-in sharing feature enabled. The leaked system report could reveal environment details, software versions, and configuration data, which attackers could leverage for targeted attacks or privilege escalation. Although it does not directly compromise data integrity or availability, the confidentiality breach can facilitate subsequent attacks, increasing overall risk. Organizations handling sensitive or regulated data may face compliance issues if such information is exposed. Public-facing websites, especially those in sectors like government, finance, healthcare, and critical infrastructure, are at higher risk due to their attractiveness to attackers. The moderate CVSS score indicates that while the vulnerability is not critical, it is sufficiently serious to warrant timely remediation to prevent potential exploitation.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the use of The Events Calendar plugin and verify the version. If running version 6.15.9 or earlier, they should disable the "Yes, automatically share my system information with The Events Calendar support team" setting to prevent exposure until a patch is available. Applying updates to a fixed version once released is the most effective mitigation. In the absence of an official patch, organizations can implement web application firewall (WAF) rules to block or monitor requests to the sysinfo REST endpoint, especially those containing boolean values in the key parameter. Additionally, restricting access to the REST API endpoints to authenticated users or trusted IP ranges can reduce exposure. Regular security audits and monitoring for unusual access patterns to the sysinfo endpoint can help detect exploitation attempts. Educating site administrators about the risks of enabling automatic system info sharing is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T20:31:22.244Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b1bd197eccd907387bdc2

Added to database: 11/5/2025, 9:41:37 AM

Last enriched: 11/5/2025, 9:53:07 AM

Last updated: 11/5/2025, 10:44:09 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats