Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12356: CWE-862 Missing Authorization in tickera Tickera – Sell Tickets & Manage Events

0
Medium
VulnerabilityCVE-2025-12356cvecve-2025-12356cwe-862
Published: Wed Feb 18 2026 (02/18/2026, 05:29:18 UTC)
Source: CVE Database V5
Vendor/Project: tickera
Product: Tickera – Sell Tickets & Manage Events

Description

The Tickera – Sell Tickets & Manage Events plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_change_ticket_status' AJAX endpoint in all versions up to, and including, 3.5.6.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update post/event statuses.

AI-Powered Analysis

AILast updated: 02/18/2026, 06:16:04 UTC

Technical Analysis

CVE-2025-12356 identifies a missing authorization vulnerability (CWE-862) in the Tickera – Sell Tickets & Manage Events plugin for WordPress, present in all versions up to and including 3.5.6.4. The vulnerability exists because the plugin fails to perform a capability check on the 'wp_ajax_change_ticket_status' AJAX endpoint. This endpoint is responsible for changing the status of tickets or events, such as marking tickets as sold, canceled, or pending. Due to the missing authorization, any authenticated user with at least Subscriber-level privileges can invoke this endpoint and alter ticket or event statuses without having the appropriate permissions. The vulnerability does not require user interaction and can be exploited remotely, given that the attacker has a valid WordPress account with Subscriber or higher access. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity of attack (AC:L), network attack vector (AV:N), and limited impact on integrity (I:L) with no impact on confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability could be leveraged to disrupt event operations, cause confusion among attendees, or manipulate ticket availability, potentially leading to financial or reputational damage for event organizers using the plugin.

Potential Impact

For European organizations relying on the Tickera plugin for managing ticket sales and events, this vulnerability poses a risk of unauthorized modification of event and ticket data. Attackers with low-level authenticated access can manipulate ticket statuses, potentially leading to fraudulent ticket sales, denial of legitimate ticket purchases, or disruption of event logistics. This can result in financial losses, customer dissatisfaction, and reputational harm. Since the vulnerability does not affect confidentiality or availability, the primary concern is data integrity and operational disruption. Organizations in sectors such as entertainment, conferences, and cultural events are particularly at risk. The impact is heightened in Europe due to the widespread use of WordPress and event management plugins, combined with stringent data protection regulations that may hold organizations accountable for security lapses affecting customer data and services.

Mitigation Recommendations

1. Immediately restrict access to the 'wp_ajax_change_ticket_status' AJAX endpoint by implementing server-side capability checks to ensure only authorized roles (e.g., administrators or event managers) can invoke it. 2. Upgrade the Tickera plugin to a patched version once available; monitor vendor announcements for updates. 3. In the interim, limit user roles and permissions within WordPress to minimize the number of users with Subscriber-level or higher access, especially on sites managing sensitive event data. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting this endpoint. 5. Conduct regular audits of user accounts and event/ticket status changes to detect suspicious activities. 6. Educate site administrators on the risks of granting unnecessary privileges and enforce the principle of least privilege. 7. Consider isolating event management functions on dedicated WordPress instances with stricter access controls to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T15:39:42.084Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995557f80d747be2043e5f9

Added to database: 2/18/2026, 6:00:31 AM

Last enriched: 2/18/2026, 6:16:04 AM

Last updated: 2/21/2026, 12:16:55 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats