Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4796: CWE-639 Authorization Bypass Through User-Controlled Key in arraytics Eventin – Event Manager, Events Calendar, Booking, Tickets and Registration

0
High
VulnerabilityCVE-2025-4796cvecve-2025-4796cwe-639
Published: Fri Aug 08 2025 (08/08/2025, 18:26:26 UTC)
Source: CVE Database V5
Vendor/Project: arraytics
Product: Eventin – Event Manager, Events Calendar, Booking, Tickets and Registration

Description

The Eventin plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.34. This is due to the plugin not properly validating a user's identity or capability prior to updating their details like email in the 'Eventin\Speaker\Api\SpeakerController::update_item' function. This makes it possible for unauthenticated attackers with contributor-level and above permissions to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:50:47 UTC

Technical Analysis

CVE-2025-4796 is a critical authorization bypass vulnerability affecting the Eventin plugin for WordPress, which manages events, bookings, tickets, and registrations. The vulnerability arises from improper validation in the 'Eventin\Speaker\Api\SpeakerController::update_item' function, where the plugin fails to verify the identity or capability of users attempting to update their details, such as email addresses. This flaw allows attackers with contributor-level permissions or higher to modify arbitrary users' email addresses, including those of administrators. By changing an administrator's email, the attacker can trigger password reset mechanisms to take over the administrator's account, effectively escalating privileges to full administrative control. The vulnerability requires no user interaction and can be exploited remotely over the network with low complexity. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can fully compromise affected WordPress sites. The vulnerability affects all versions of the Eventin plugin up to and including 4.0.34. Although no public exploits are currently known, the widespread use of WordPress and this plugin makes this a significant risk. The root cause is classified under CWE-639, which involves authorization bypass through user-controlled keys or parameters. This vulnerability highlights the importance of strict capability checks and identity validation in web application APIs, especially those handling sensitive user data and administrative functions.

Potential Impact

The impact of CVE-2025-4796 is severe for organizations using the Eventin WordPress plugin. Successful exploitation allows attackers to escalate privileges from contributor-level users to full administrators by hijacking administrator accounts via email changes and password resets. This leads to complete site compromise, including the ability to modify content, install malicious plugins or backdoors, steal sensitive data, disrupt event management operations, and potentially pivot to other internal systems. Organizations relying on Eventin for critical event management, ticketing, or registration functions face operational disruption and reputational damage. The vulnerability undermines the integrity and confidentiality of user accounts and data, and availability may be affected if attackers deface or disable the site. Given WordPress's extensive global usage, the threat surface is large, and attackers can exploit this vulnerability remotely without user interaction, increasing the risk of widespread exploitation if unpatched.

Mitigation Recommendations

To mitigate CVE-2025-4796, organizations should immediately update the Eventin plugin to a patched version once released by the vendor. Until a patch is available, restrict contributor-level and higher permissions to trusted users only, minimizing the risk of exploitation. Implement additional monitoring and alerting for suspicious changes to user email addresses and password reset requests. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized API calls targeting the vulnerable update_item function. Conduct regular audits of user roles and permissions to ensure least privilege principles. Consider disabling or limiting the use of the Eventin plugin if it is not essential. Additionally, enforce multi-factor authentication (MFA) for all administrator accounts to reduce the impact of account takeover attempts. Finally, maintain regular backups and incident response plans to recover quickly from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-15T17:20:16.666Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68964654ad5a09ad0005efb8

Added to database: 8/8/2025, 6:47:48 PM

Last enriched: 2/27/2026, 2:50:47 PM

Last updated: 3/25/2026, 4:27:33 PM

Views: 240

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses