CVE-2025-12498: CWE-862 Missing Authorization in metagauss EventPrime – Events Calendar, Bookings and Tickets
The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized booking note creation due to a missing capability check on the 'booking_add_notes' function in all versions up to, and including, 4.2.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add a note to the backend view of any booking.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-12498 affects the EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress, a widely used tool for managing events, bookings, and tickets. The core issue is a missing authorization check (CWE-862) in the 'booking_add_notes' function, which is responsible for adding notes to bookings in the backend interface. This missing capability check means that any authenticated user with at least Subscriber-level privileges can add notes to any booking record, regardless of ownership or role restrictions. The vulnerability affects all versions up to and including 4.2.0.0. The CVSS v3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (remote), with low attack complexity, requiring low privileges (authenticated user), and no user interaction. The impact is limited to integrity, as unauthorized notes can be injected, potentially misleading administrators or users reviewing booking information. Confidentiality and availability are not affected. No known exploits have been reported in the wild, and no official patches or updates have been published at the time of this analysis. The vulnerability was publicly disclosed on November 8, 2025, with the initial reservation date on October 29, 2025. The plugin is developed by metagauss and is popular among WordPress users for event management. This vulnerability could be leveraged by malicious insiders or compromised accounts to manipulate booking data, potentially causing confusion, fraud, or operational disruption in event management workflows.
Potential Impact
For European organizations, the primary impact of CVE-2025-12498 lies in the integrity of booking data within event management systems. Unauthorized addition of booking notes could lead to misinformation, miscommunication, or fraudulent activities such as falsifying booking statuses or instructions. This could undermine trust in event operations, cause financial discrepancies, or disrupt customer service. While confidentiality and availability remain unaffected, the integrity compromise could have cascading effects on business processes relying on accurate booking information. Organizations handling large volumes of event bookings or sensitive client data may face reputational damage or operational inefficiencies. The risk is heightened in environments where multiple users have Subscriber-level access or higher, increasing the attack surface. Since exploitation requires authentication, the threat is more relevant to insider threats or compromised user accounts rather than external anonymous attackers. European companies using WordPress extensively for event management, especially in sectors like entertainment, conferences, and ticketing services, should be particularly vigilant.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first audit and minimize the number of users with Subscriber-level or higher access to the WordPress backend, enforcing the principle of least privilege. Implement strict user role management and monitor for unusual activity related to booking notes. Employ multi-factor authentication (MFA) to reduce the risk of account compromise. Until an official patch is released, consider temporarily disabling the EventPrime plugin or restricting its access via web application firewalls or custom access controls. Review and harden WordPress security settings, including limiting plugin management capabilities to trusted administrators only. Regularly monitor logs for unauthorized note additions or suspicious backend activity. Once a patch or update addressing this vulnerability becomes available from metagauss, apply it promptly. Additionally, consider implementing anomaly detection systems to flag unexpected changes in booking data. Educate staff about the risks of credential sharing and phishing attacks that could lead to account compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-12498: CWE-862 Missing Authorization in metagauss EventPrime – Events Calendar, Bookings and Tickets
Description
The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized booking note creation due to a missing capability check on the 'booking_add_notes' function in all versions up to, and including, 4.2.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add a note to the backend view of any booking.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-12498 affects the EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress, a widely used tool for managing events, bookings, and tickets. The core issue is a missing authorization check (CWE-862) in the 'booking_add_notes' function, which is responsible for adding notes to bookings in the backend interface. This missing capability check means that any authenticated user with at least Subscriber-level privileges can add notes to any booking record, regardless of ownership or role restrictions. The vulnerability affects all versions up to and including 4.2.0.0. The CVSS v3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (remote), with low attack complexity, requiring low privileges (authenticated user), and no user interaction. The impact is limited to integrity, as unauthorized notes can be injected, potentially misleading administrators or users reviewing booking information. Confidentiality and availability are not affected. No known exploits have been reported in the wild, and no official patches or updates have been published at the time of this analysis. The vulnerability was publicly disclosed on November 8, 2025, with the initial reservation date on October 29, 2025. The plugin is developed by metagauss and is popular among WordPress users for event management. This vulnerability could be leveraged by malicious insiders or compromised accounts to manipulate booking data, potentially causing confusion, fraud, or operational disruption in event management workflows.
Potential Impact
For European organizations, the primary impact of CVE-2025-12498 lies in the integrity of booking data within event management systems. Unauthorized addition of booking notes could lead to misinformation, miscommunication, or fraudulent activities such as falsifying booking statuses or instructions. This could undermine trust in event operations, cause financial discrepancies, or disrupt customer service. While confidentiality and availability remain unaffected, the integrity compromise could have cascading effects on business processes relying on accurate booking information. Organizations handling large volumes of event bookings or sensitive client data may face reputational damage or operational inefficiencies. The risk is heightened in environments where multiple users have Subscriber-level access or higher, increasing the attack surface. Since exploitation requires authentication, the threat is more relevant to insider threats or compromised user accounts rather than external anonymous attackers. European companies using WordPress extensively for event management, especially in sectors like entertainment, conferences, and ticketing services, should be particularly vigilant.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first audit and minimize the number of users with Subscriber-level or higher access to the WordPress backend, enforcing the principle of least privilege. Implement strict user role management and monitor for unusual activity related to booking notes. Employ multi-factor authentication (MFA) to reduce the risk of account compromise. Until an official patch is released, consider temporarily disabling the EventPrime plugin or restricting its access via web application firewalls or custom access controls. Review and harden WordPress security settings, including limiting plugin management capabilities to trusted administrators only. Regularly monitor logs for unauthorized note additions or suspicious backend activity. Once a patch or update addressing this vulnerability becomes available from metagauss, apply it promptly. Additionally, consider implementing anomaly detection systems to flag unexpected changes in booking data. Educate staff about the risks of credential sharing and phishing attacks that could lead to account compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-29T23:16:36.772Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690ee8d444af18c375220269
Added to database: 11/8/2025, 6:53:08 AM
Last enriched: 11/15/2025, 7:22:48 AM
Last updated: 12/23/2025, 9:25:48 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
3.5 Million Affected by University of Phoenix Data Breach
MediumCyberattack Disrupts France’s Postal Service and Banking During Christmas Rush
MediumCVE-2025-68655
UnknownCVE-2025-68654
UnknownCVE-2025-68653
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.