Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12954: CWE-639 Authorization Bypass Through User-Controlled Key in Timetable and Event Schedule by MotoPress

0
Low
VulnerabilityCVE-2025-12954cvecve-2025-12954cwe-639
Published: Wed Dec 03 2025 (12/03/2025, 06:00:05 UTC)
Source: CVE Database V5
Product: Timetable and Event Schedule by MotoPress

Description

The Timetable and Event Schedule by MotoPress WordPress plugin before 2.4.16 does not verify a user has access to a specific event when duplicating, leading to arbitrary event disclosure when to users with a role as low as Contributor.

AI-Powered Analysis

AILast updated: 01/09/2026, 20:51:55 UTC

Technical Analysis

CVE-2025-12954 identifies an authorization bypass vulnerability in the Timetable and Event Schedule by MotoPress WordPress plugin prior to version 2.4.16. The flaw stems from the plugin's failure to verify whether a user has the necessary permissions to access a specific event when performing a duplication operation. Specifically, users with the Contributor role, which typically has limited privileges, can exploit this vulnerability to disclose arbitrary event information by duplicating events they should not have access to. This vulnerability is categorized under CWE-639, which involves authorization bypass through user-controlled keys or parameters. The attack vector is network-based and requires the attacker to be authenticated with at least Contributor-level access, but no user interaction is necessary beyond that. The vulnerability impacts confidentiality by exposing event details but does not affect data integrity or availability. The CVSS v3.1 base score is 2.7, reflecting low severity due to the limited impact and required privileges. No public exploits or active exploitation have been reported to date. The issue is resolved in version 2.4.16 of the plugin, which implements proper access control checks during event duplication to prevent unauthorized disclosure.

Potential Impact

For European organizations, the primary impact of CVE-2025-12954 is the unauthorized disclosure of event-related information within WordPress sites using the affected plugin. While the confidentiality breach may seem limited, event data could include sensitive scheduling information, internal meetings, or customer-related events, potentially leading to privacy violations or leakage of business-sensitive information. Organizations relying on this plugin for public-facing or internal event management could face reputational damage or compliance issues, especially under GDPR if personal data is involved. The vulnerability does not allow modification or deletion of data, nor does it affect system availability, limiting the scope of damage. However, attackers with Contributor-level access—often granted to less trusted users or external collaborators—could leverage this flaw to gain insights into restricted events, which might be used for social engineering or further attacks. The risk is higher in environments where event data is confidential or strategically important. Since the plugin is popular among WordPress users, organizations in sectors such as education, event management, and corporate communications across Europe should be vigilant.

Mitigation Recommendations

To mitigate CVE-2025-12954, European organizations should immediately upgrade the Timetable and Event Schedule by MotoPress plugin to version 2.4.16 or later, where the authorization checks have been properly implemented. Additionally, organizations should audit user roles and permissions within WordPress to ensure that Contributor-level users have minimal access and that sensitive event data is not exposed unnecessarily. Implementing the principle of least privilege by restricting Contributor roles or using custom roles with tailored permissions can reduce risk. Monitoring and logging duplication actions in the plugin can help detect suspicious activity. If upgrading is not immediately feasible, consider temporarily restricting event duplication functionality to higher-privileged roles or disabling the plugin if event duplication is not critical. Regularly review and update WordPress plugins and themes to avoid similar vulnerabilities. Finally, educate administrators and users about the risks of privilege escalation and unauthorized data access within WordPress environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-11-10T14:33:20.287Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692fd8dd70961fbaa2808df5

Added to database: 12/3/2025, 6:29:49 AM

Last enriched: 1/9/2026, 8:51:55 PM

Last updated: 1/18/2026, 12:15:08 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats