Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12408: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in netweblogic Events Manager – Calendar, Bookings, Tickets, and more!

0
Medium
VulnerabilityCVE-2025-12408cvecve-2025-12408cwe-200
Published: Fri Dec 12 2025 (12/12/2025, 11:15:50 UTC)
Source: CVE Database V5
Vendor/Project: netweblogic
Product: Events Manager – Calendar, Bookings, Tickets, and more!

Description

The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 7.2.2.2 via the 'get_location' action due to insufficient restrictions on which locations can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft event locations that they should not have access to.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:32:09 UTC

Technical Analysis

CVE-2025-12408 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the 'Events Manager – Calendar, Bookings, Tickets, and more!' WordPress plugin developed by netweblogic. This plugin, widely used for managing events, bookings, and tickets, contains a flaw in its 'get_location' action that fails to properly restrict access to location data associated with events. Specifically, the vulnerability allows unauthenticated attackers to extract sensitive information from locations tied to password-protected, private, or draft events, which should normally be inaccessible without proper authorization. The root cause is insufficient access control checks on which event locations can be included in responses to the 'get_location' action. The vulnerability affects all versions up to and including 7.2.2.2. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the ease of remote exploitation without authentication or user interaction, but limited to confidentiality impact only. There are no known exploits in the wild at the time of publication. The exposure of sensitive location data could lead to privacy violations, leakage of confidential event details, and potential reconnaissance for further attacks. The plugin's widespread use in WordPress sites makes this a notable risk, especially for organizations relying on event privacy. No official patches were listed at the time of reporting, so mitigation may require manual access control reviews or plugin updates once available.

Potential Impact

The primary impact of CVE-2025-12408 is the unauthorized disclosure of sensitive event location information, including those marked as password-protected, private, or drafts. This breach of confidentiality can undermine user privacy, expose business-sensitive event details, and facilitate further targeted attacks or social engineering by revealing internal or restricted event data. While the vulnerability does not affect data integrity or system availability, the leakage of sensitive information can damage organizational reputation and trust. For organizations managing confidential or proprietary events, this exposure could lead to competitive disadvantages or regulatory compliance issues, especially under data protection laws that mandate safeguarding personal or sensitive information. Since exploitation requires no authentication or user interaction, the attack surface is broad, increasing the likelihood of automated scanning and data harvesting by malicious actors. The absence of known exploits currently limits immediate widespread impact, but the vulnerability remains a significant risk until remediated.

Mitigation Recommendations

Organizations should immediately assess their use of the 'Events Manager – Calendar, Bookings, Tickets, and more!' plugin and identify if versions up to 7.2.2.2 are deployed. Until an official patch is released, administrators should consider the following mitigations: (1) Restrict access to the 'get_location' action by implementing web application firewall (WAF) rules that block unauthenticated requests targeting this endpoint or action parameter. (2) Limit public exposure of event location data by configuring plugin settings to minimize information disclosure, such as disabling public access to draft or private event locations. (3) Employ strict user role and permission management to ensure only authorized users can access sensitive event data. (4) Monitor web server logs and application logs for unusual or repeated access attempts to the 'get_location' action, indicating potential exploitation attempts. (5) Consider temporarily disabling or replacing the plugin if sensitive data exposure risk is unacceptable and no patch is available. (6) Stay updated with vendor advisories and apply patches promptly once released. (7) Conduct security audits and penetration testing focused on event management functionalities to detect any residual access control weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T15:15:50.054Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bfc942d1261d38d80bd97

Added to database: 12/12/2025, 11:29:24 AM

Last enriched: 2/27/2026, 8:32:09 PM

Last updated: 3/26/2026, 3:24:35 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses