CVE-2025-12954: CWE-639 Authorization Bypass Through User-Controlled Key in Timetable and Event Schedule by MotoPress
The Timetable and Event Schedule by MotoPress WordPress plugin before 2.4.16 does not verify a user has access to a specific event when duplicating, leading to arbitrary event disclosure when to users with a role as low as Contributor.
AI Analysis
Technical Summary
CVE-2025-12954 identifies an authorization bypass vulnerability in the Timetable and Event Schedule by MotoPress WordPress plugin prior to version 2.4.16. The flaw stems from the plugin's failure to verify whether a user has the necessary permissions to access a specific event when performing a duplication operation. Specifically, users with the Contributor role, which typically has limited privileges, can exploit this vulnerability to disclose arbitrary event information by duplicating events they should not have access to. This vulnerability is categorized under CWE-639, which involves authorization bypass through user-controlled keys or parameters. The attack vector is network-based and requires the attacker to be authenticated with at least Contributor-level access, but no user interaction is necessary beyond that. The vulnerability impacts confidentiality by exposing event details but does not affect data integrity or availability. The CVSS v3.1 base score is 2.7, reflecting low severity due to the limited impact and required privileges. No public exploits or active exploitation have been reported to date. The issue is resolved in version 2.4.16 of the plugin, which implements proper access control checks during event duplication to prevent unauthorized disclosure.
Potential Impact
For European organizations, the primary impact of CVE-2025-12954 is the unauthorized disclosure of event-related information within WordPress sites using the affected plugin. While the confidentiality breach may seem limited, event data could include sensitive scheduling information, internal meetings, or customer-related events, potentially leading to privacy violations or leakage of business-sensitive information. Organizations relying on this plugin for public-facing or internal event management could face reputational damage or compliance issues, especially under GDPR if personal data is involved. The vulnerability does not allow modification or deletion of data, nor does it affect system availability, limiting the scope of damage. However, attackers with Contributor-level access—often granted to less trusted users or external collaborators—could leverage this flaw to gain insights into restricted events, which might be used for social engineering or further attacks. The risk is higher in environments where event data is confidential or strategically important. Since the plugin is popular among WordPress users, organizations in sectors such as education, event management, and corporate communications across Europe should be vigilant.
Mitigation Recommendations
To mitigate CVE-2025-12954, European organizations should immediately upgrade the Timetable and Event Schedule by MotoPress plugin to version 2.4.16 or later, where the authorization checks have been properly implemented. Additionally, organizations should audit user roles and permissions within WordPress to ensure that Contributor-level users have minimal access and that sensitive event data is not exposed unnecessarily. Implementing the principle of least privilege by restricting Contributor roles or using custom roles with tailored permissions can reduce risk. Monitoring and logging duplication actions in the plugin can help detect suspicious activity. If upgrading is not immediately feasible, consider temporarily restricting event duplication functionality to higher-privileged roles or disabling the plugin if event duplication is not critical. Regularly review and update WordPress plugins and themes to avoid similar vulnerabilities. Finally, educate administrators and users about the risks of privilege escalation and unauthorized data access within WordPress environments.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2025-12954: CWE-639 Authorization Bypass Through User-Controlled Key in Timetable and Event Schedule by MotoPress
Description
The Timetable and Event Schedule by MotoPress WordPress plugin before 2.4.16 does not verify a user has access to a specific event when duplicating, leading to arbitrary event disclosure when to users with a role as low as Contributor.
AI-Powered Analysis
Technical Analysis
CVE-2025-12954 identifies an authorization bypass vulnerability in the Timetable and Event Schedule by MotoPress WordPress plugin prior to version 2.4.16. The flaw stems from the plugin's failure to verify whether a user has the necessary permissions to access a specific event when performing a duplication operation. Specifically, users with the Contributor role, which typically has limited privileges, can exploit this vulnerability to disclose arbitrary event information by duplicating events they should not have access to. This vulnerability is categorized under CWE-639, which involves authorization bypass through user-controlled keys or parameters. The attack vector is network-based and requires the attacker to be authenticated with at least Contributor-level access, but no user interaction is necessary beyond that. The vulnerability impacts confidentiality by exposing event details but does not affect data integrity or availability. The CVSS v3.1 base score is 2.7, reflecting low severity due to the limited impact and required privileges. No public exploits or active exploitation have been reported to date. The issue is resolved in version 2.4.16 of the plugin, which implements proper access control checks during event duplication to prevent unauthorized disclosure.
Potential Impact
For European organizations, the primary impact of CVE-2025-12954 is the unauthorized disclosure of event-related information within WordPress sites using the affected plugin. While the confidentiality breach may seem limited, event data could include sensitive scheduling information, internal meetings, or customer-related events, potentially leading to privacy violations or leakage of business-sensitive information. Organizations relying on this plugin for public-facing or internal event management could face reputational damage or compliance issues, especially under GDPR if personal data is involved. The vulnerability does not allow modification or deletion of data, nor does it affect system availability, limiting the scope of damage. However, attackers with Contributor-level access—often granted to less trusted users or external collaborators—could leverage this flaw to gain insights into restricted events, which might be used for social engineering or further attacks. The risk is higher in environments where event data is confidential or strategically important. Since the plugin is popular among WordPress users, organizations in sectors such as education, event management, and corporate communications across Europe should be vigilant.
Mitigation Recommendations
To mitigate CVE-2025-12954, European organizations should immediately upgrade the Timetable and Event Schedule by MotoPress plugin to version 2.4.16 or later, where the authorization checks have been properly implemented. Additionally, organizations should audit user roles and permissions within WordPress to ensure that Contributor-level users have minimal access and that sensitive event data is not exposed unnecessarily. Implementing the principle of least privilege by restricting Contributor roles or using custom roles with tailored permissions can reduce risk. Monitoring and logging duplication actions in the plugin can help detect suspicious activity. If upgrading is not immediately feasible, consider temporarily restricting event duplication functionality to higher-privileged roles or disabling the plugin if event duplication is not critical. Regularly review and update WordPress plugins and themes to avoid similar vulnerabilities. Finally, educate administrators and users about the risks of privilege escalation and unauthorized data access within WordPress environments.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-11-10T14:33:20.287Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692fd8dd70961fbaa2808df5
Added to database: 12/3/2025, 6:29:49 AM
Last enriched: 1/9/2026, 8:51:55 PM
Last updated: 1/18/2026, 12:15:08 AM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1105: SQL Injection in EasyCMS
MediumCVE-2026-1066: Command Injection in kalcaddle kodbox
MediumCVE-2026-1064: Command Injection in bastillion-io Bastillion
MediumCVE-2026-1063: Command Injection in bastillion-io Bastillion
MediumCVE-2026-1062: Server-Side Request Forgery in xiweicheng TMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.