Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5733: CWE-201 Insertion of Sensitive Information Into Sent Data in webnus/ Modern Events Calendar Lite

0
Medium
VulnerabilityCVE-2025-5733cvecve-2025-5733cwe-201
Published: Fri Jun 06 2025 (06/06/2025, 03:41:23 UTC)
Source: CVE Database V5
Vendor/Project: webnus/
Product: Modern Events Calendar Lite

Description

The Modern Events Calendar Lite plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 7.21.9. This is due improper or insufficient validation of the id property when exporting calendars. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:31:49 UTC

Technical Analysis

CVE-2025-5733 is a vulnerability classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting the Modern Events Calendar Lite plugin for WordPress, versions up to 7.21.9. The flaw arises from insufficient validation of the 'id' property when exporting calendar data, which allows unauthenticated attackers to retrieve the full filesystem path of the web application. This full path disclosure occurs because the plugin inadvertently includes sensitive path information in its response to crafted export requests. While the disclosed information does not directly compromise confidentiality, integrity, or availability, it provides attackers with valuable reconnaissance data that can be leveraged to identify the server environment, directory structure, and potentially facilitate more damaging attacks such as local file inclusion, remote code execution, or privilege escalation if other vulnerabilities exist. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the limited direct impact but ease of exploitation and potential to aid further attacks. No patches or mitigations were linked at the time of disclosure, and no active exploits have been reported in the wild. The vulnerability was publicly disclosed on June 6, 2025, and assigned by Wordfence.

Potential Impact

The primary impact of CVE-2025-5733 is information disclosure, specifically revealing the full filesystem path of the web server hosting the Modern Events Calendar Lite plugin. While this does not immediately compromise sensitive data or system integrity, it significantly aids attackers in crafting more precise and effective attacks by providing insight into the server environment and directory layout. This can facilitate exploitation of other vulnerabilities such as local file inclusion, path traversal, or privilege escalation. For organizations, this means an increased risk of targeted attacks against WordPress sites using this plugin, potentially leading to data breaches, website defacement, or service disruption if combined with additional vulnerabilities. The vulnerability affects all installations of the plugin up to version 7.21.9, which is widely used in WordPress sites globally, including small businesses, event organizers, and enterprises relying on WordPress for content management. The ease of exploitation without authentication or user interaction increases the likelihood of opportunistic scanning and reconnaissance by attackers. However, the lack of known active exploits and the medium severity rating suggest the immediate threat is moderate but should not be ignored.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from the plugin vendor (webnus) as soon as they become available to remediate the vulnerability. 2. Until patches are released, restrict access to the calendar export functionality by implementing IP whitelisting or authentication controls at the web server or application level to prevent unauthenticated requests. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'id' parameter in calendar export endpoints. 4. Conduct regular security assessments and vulnerability scans on WordPress installations to identify outdated plugins and configuration weaknesses. 5. Implement least privilege principles for WordPress users and server file permissions to limit the impact of potential follow-on attacks. 6. Monitor logs for unusual access patterns or repeated requests to the export functionality that may indicate reconnaissance attempts. 7. Educate site administrators about the risks of using outdated plugins and the importance of timely updates. 8. Consider disabling or replacing the Modern Events Calendar Lite plugin if immediate patching is not feasible and the export feature is not critical to operations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-05T15:04:36.173Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842df031a426642debc9583

Added to database: 6/6/2025, 12:28:51 PM

Last enriched: 2/27/2026, 3:31:49 PM

Last updated: 3/22/2026, 10:33:02 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses