Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14507: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in metagauss EventPrime – Events Calendar, Bookings and Tickets

0
Medium
VulnerabilityCVE-2025-14507cvecve-2025-14507cwe-200
Published: Tue Jan 13 2026 (01/13/2026, 13:49:13 UTC)
Source: CVE Database V5
Vendor/Project: metagauss
Product: EventPrime – Events Calendar, Bookings and Tickets

Description

The EventPrime - Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.7.0 via the REST API. This makes it possible for unauthenticated attackers to extract sensitive booking data including user names, email addresses, ticket details, payment information, and order keys when the API is enabled by an administrator. The vulnerability was partially patched in version 4.2.7.0.

AI-Powered Analysis

AILast updated: 01/13/2026, 14:30:31 UTC

Technical Analysis

CVE-2025-14507 identifies a vulnerability in the EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress, which is widely used to manage event bookings and ticket sales. The flaw exists in all versions up to and including 4.2.7.0 and stems from insufficient access controls on the plugin's REST API endpoints. When the REST API is enabled by an administrator, unauthenticated attackers can query these endpoints to retrieve sensitive booking data such as user names, email addresses, ticket details, payment information, and order keys. This exposure is classified under CWE-200, indicating that sensitive information is accessible to unauthorized actors. The vulnerability does not require authentication or user interaction, making it easier to exploit remotely over the network. Although version 4.2.7.0 includes a partial fix, the absence of a complete patch and lack of default API restrictions mean that many installations remain vulnerable. The CVSS 3.1 base score of 5.3 reflects a medium severity, primarily due to the confidentiality impact without affecting integrity or availability. No known exploits have been reported in the wild, but the potential for data leakage is significant given the nature of the exposed information. The vulnerability highlights the risks of enabling REST API features without strict access controls in WordPress plugins handling sensitive data.

Potential Impact

For European organizations, the exposure of sensitive booking and payment data can lead to privacy violations under GDPR, resulting in regulatory fines and reputational damage. Compromised personal information such as names and email addresses can facilitate phishing campaigns, identity theft, and social engineering attacks. Exposure of payment details and order keys increases the risk of financial fraud and unauthorized transactions. Organizations relying on EventPrime for event management may face customer trust erosion and potential legal liabilities. The vulnerability also raises concerns for sectors with high event volumes, such as entertainment, conferences, and cultural institutions, which are prevalent across Europe. Data breaches could disrupt business operations and lead to costly incident response efforts. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, affecting any publicly accessible WordPress site using the vulnerable plugin with enabled REST API. This makes European organizations using this plugin particularly vulnerable if they have not applied patches or restricted API access.

Mitigation Recommendations

European organizations should immediately update the EventPrime plugin to the latest version beyond 4.2.7.0 once a complete patch is released. Until then, administrators should disable the REST API functionality for EventPrime if it is not strictly necessary. Implement strict access controls and authentication mechanisms on REST API endpoints to prevent unauthenticated access. Conduct regular audits of WordPress plugins and their configurations to identify and remediate insecure settings. Employ web application firewalls (WAFs) to monitor and block suspicious API requests targeting EventPrime endpoints. Monitor logs for unusual access patterns indicative of exploitation attempts. Educate site administrators about the risks of enabling APIs without proper security measures. Additionally, review and limit the amount of sensitive data stored or exposed via plugins to minimize potential leakage. Prepare incident response plans to address potential data breaches involving personal and payment information. Finally, maintain up-to-date backups and ensure secure storage of sensitive customer data in compliance with GDPR.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-11T00:38:29.878Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69664f10a60475309f2ea2cb

Added to database: 1/13/2026, 1:56:32 PM

Last enriched: 1/13/2026, 2:30:31 PM

Last updated: 1/14/2026, 6:21:40 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats