Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12954: CWE-639 Authorization Bypass Through User-Controlled Key in Timetable and Event Schedule by MotoPress

0
Unknown
VulnerabilityCVE-2025-12954cvecve-2025-12954cwe-639
Published: Wed Dec 03 2025 (12/03/2025, 06:00:05 UTC)
Source: CVE Database V5
Product: Timetable and Event Schedule by MotoPress

Description

The Timetable and Event Schedule by MotoPress WordPress plugin before 2.4.16 does not verify a user has access to a specific event when duplicating, leading to arbitrary event disclosure when to users with a role as low as Contributor.

AI-Powered Analysis

AILast updated: 12/03/2025, 06:44:47 UTC

Technical Analysis

CVE-2025-12954 is a security vulnerability identified in the Timetable and Event Schedule by MotoPress WordPress plugin, affecting all versions prior to 2.4.16. The flaw is an authorization bypass caused by improper verification of user permissions when duplicating events. Specifically, the plugin fails to confirm whether the user has access rights to a particular event before allowing the duplication operation. This vulnerability is classified under CWE-639, which relates to authorization bypass through user-controlled keys or parameters. In this case, a user with a Contributor role, which is a relatively low-privilege role in WordPress, can exploit this flaw to access arbitrary event data that should be restricted. The unauthorized access could lead to disclosure of sensitive event details, potentially exposing confidential scheduling information or private event data. Although no exploits have been reported in the wild, the vulnerability is publicly disclosed and poses a risk to websites using this plugin. The absence of a CVSS score requires an assessment based on the nature of the vulnerability: it impacts confidentiality primarily, is exploitable without elevated privileges, and does not require user interaction beyond the attacker's own actions. The scope is limited to sites using the affected plugin versions. The vulnerability was reserved and published in late 2025, with no patch links currently available, indicating that a fix may be forthcoming or recently released. Organizations relying on this plugin should prioritize remediation to prevent unauthorized data exposure.

Potential Impact

For European organizations, the impact of CVE-2025-12954 centers on the unauthorized disclosure of event-related information managed through WordPress sites using the Timetable and Event Schedule by MotoPress plugin. This could include internal corporate events, client meetings, or other sensitive scheduling data. Exposure of such information may lead to reputational damage, loss of competitive advantage, or privacy violations under GDPR if personal data is involved. Since the vulnerability can be exploited by users with Contributor-level access, it lowers the barrier for insider threats or compromised accounts to access restricted data. This risk is particularly relevant for organizations that rely heavily on WordPress for event management and have multiple contributors with limited privileges. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure. The impact on availability and integrity is minimal, but confidentiality breaches can have significant operational and compliance consequences.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate this vulnerability: 1) Immediately audit WordPress sites to identify installations of the Timetable and Event Schedule by MotoPress plugin and verify the version in use. 2) Apply the official patch or update the plugin to version 2.4.16 or later as soon as it becomes available from the vendor. 3) Until patched, restrict Contributor role permissions or temporarily disable the duplication feature if possible to limit exploitation vectors. 4) Implement monitoring and logging of event duplication activities to detect suspicious access patterns. 5) Conduct a review of user roles and permissions to ensure the principle of least privilege is enforced, minimizing the number of users with Contributor or higher roles. 6) Educate site administrators and content managers about the vulnerability and the importance of timely updates. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized duplication requests targeting this plugin. 8) Regularly review and update incident response plans to include scenarios involving unauthorized data disclosure from WordPress plugins.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-11-10T14:33:20.287Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692fd8dd70961fbaa2808df5

Added to database: 12/3/2025, 6:29:49 AM

Last enriched: 12/3/2025, 6:44:47 AM

Last updated: 12/3/2025, 8:35:54 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats