Skip to main content

CVE-2025-7813: CWE-918 Server-Side Request Forgery (SSRF) in arraytics Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin

High
VulnerabilityCVE-2025-7813cvecve-2025-7813cwe-918
Published: Sat Aug 23 2025 (08/23/2025, 05:48:19 UTC)
Source: CVE Database V5
Vendor/Project: arraytics
Product: Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin

Description

The Events Calendar, Event Booking, Registrations and Event Tickets – Eventin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.37 via the proxy_image function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 08/23/2025, 06:17:50 UTC

Technical Analysis

CVE-2025-7813 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting the Eventin plugin for WordPress, developed by arraytics. This plugin provides AI-powered event management features including event calendars, booking, registrations, and ticketing. The vulnerability exists in all versions up to and including 4.0.37, specifically within the proxy_image function. SSRF vulnerabilities allow an attacker to induce the server-side application to make HTTP requests to arbitrary locations, potentially including internal network resources that are not directly accessible from the internet. In this case, the vulnerability is exploitable without authentication or user interaction, meaning any unauthenticated attacker can leverage it remotely. The CVSS 3.1 base score is 7.2 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change. The impact includes limited confidentiality and integrity loss, as attackers can query and potentially modify information on internal services by abusing the server's ability to proxy requests. Although no known exploits are currently reported in the wild, the vulnerability’s nature and ease of exploitation make it a significant risk. The lack of available patches at the time of publication increases exposure. The SSRF can be used to bypass firewall restrictions, access internal APIs, metadata services, or other sensitive endpoints, which could lead to further compromise or data leakage within the affected environment.

Potential Impact

For European organizations, this vulnerability poses a considerable risk, especially those relying on WordPress sites with the Eventin plugin for event management. The ability for unauthenticated attackers to perform SSRF attacks can lead to unauthorized access to internal network resources, potentially exposing sensitive corporate data or internal services. This is particularly critical for organizations handling personal data under GDPR, as any data leakage or unauthorized access could result in regulatory penalties and reputational damage. Additionally, SSRF can be a stepping stone for lateral movement within corporate networks, increasing the risk of broader compromise. Organizations using cloud infrastructure may also be at risk if the SSRF allows access to cloud metadata services, which could lead to credential theft and further escalation. The impact on availability is minimal, but the confidentiality and integrity of internal services are at risk. Given the plugin’s widespread use in event management, sectors such as education, government, and large enterprises hosting public events in Europe could be targeted. The vulnerability’s ease of exploitation without authentication increases the urgency for mitigation.

Mitigation Recommendations

Immediate mitigation steps include disabling or removing the Eventin plugin until a security patch is released. Organizations should monitor for updates from the vendor and apply patches promptly once available. In the interim, implementing web application firewall (WAF) rules to detect and block suspicious SSRF patterns targeting the proxy_image function can reduce exposure. Network segmentation should be enforced to limit the WordPress server’s access to internal services and sensitive endpoints, minimizing the impact of SSRF exploitation. Restricting outbound HTTP requests from the web server to only necessary destinations can also mitigate risk. Logging and monitoring of outbound requests from the WordPress server should be enhanced to detect anomalous activity indicative of SSRF exploitation. Additionally, reviewing and hardening internal services to require authentication and to not trust requests originating from the WordPress server can reduce the potential damage. Organizations should conduct internal audits to identify any use of the Eventin plugin and assess exposure. Finally, educating web administrators about SSRF risks and secure plugin management is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T15:45:12.183Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a959b9ad5a09ad002780e7

Added to database: 8/23/2025, 6:03:37 AM

Last enriched: 8/23/2025, 6:17:50 AM

Last updated: 8/23/2025, 6:17:50 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats