Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7813: CWE-918 Server-Side Request Forgery (SSRF) in arraytics Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin

0
High
VulnerabilityCVE-2025-7813cvecve-2025-7813cwe-918
Published: Sat Aug 23 2025 (08/23/2025, 05:48:19 UTC)
Source: CVE Database V5
Vendor/Project: arraytics
Product: Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin

Description

The Events Calendar, Event Booking, Registrations and Event Tickets – Eventin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.37 via the proxy_image function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:38:04 UTC

Technical Analysis

CVE-2025-7813 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets plugin for WordPress developed by arraytics. This vulnerability affects all versions up to and including 4.0.37. The issue resides in the proxy_image function, which improperly handles user-supplied input to make web requests. An unauthenticated attacker can exploit this flaw to cause the web application to send HTTP requests to arbitrary URLs, including internal network resources that are not directly accessible from the internet. This can lead to unauthorized information disclosure and potential modification of internal services, undermining confidentiality and integrity. The vulnerability does not require user interaction or authentication, making it easier to exploit remotely. The CVSS v3.1 base score is 7.2, with vector AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N, indicating network attack vector, low complexity, no privileges or user interaction needed, and a scope change due to impact on resources beyond the vulnerable component. Although no exploits have been reported in the wild yet, the nature of SSRF vulnerabilities makes them attractive for attackers to pivot into internal networks or cloud metadata services. The vulnerability was publicly disclosed on August 23, 2025, with no official patches available at the time of reporting.

Potential Impact

The primary impact of CVE-2025-7813 is the potential for attackers to leverage the SSRF vulnerability to access internal network resources that are otherwise protected from external access. This can lead to unauthorized disclosure of sensitive information such as internal APIs, databases, or cloud metadata endpoints, which may contain credentials or configuration data. Attackers may also manipulate internal services if they accept HTTP requests, potentially altering data or disrupting operations. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk to organizations running the affected plugin on publicly accessible WordPress sites. The compromise of internal services can facilitate further lateral movement within an organization's infrastructure, increasing the risk of data breaches or service disruptions. The vulnerability's scope change means that the impact extends beyond the plugin itself to other systems within the internal network. Organizations relying on this plugin for event management and ticketing may face reputational damage, financial loss, and regulatory consequences if exploited.

Mitigation Recommendations

1. Immediate mitigation should focus on updating the Eventin plugin to a version that addresses this vulnerability once available from the vendor. 2. Until a patch is released, disable or restrict the proxy_image functionality if possible, or remove the plugin if it is not critical. 3. Implement strict network segmentation and firewall rules to limit the web server's ability to make outbound requests to internal services, especially sensitive endpoints like cloud metadata services or internal APIs. 4. Employ web application firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting the proxy_image function. 5. Monitor logs for unusual outbound HTTP requests originating from the WordPress server, particularly to internal IP ranges or unexpected external domains. 6. Conduct internal network scans to identify and secure any services that could be abused if accessed via SSRF. 7. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar vulnerabilities in custom plugins or integrations. 8. Consider implementing strict input validation and allowlisting for URLs or domains that the proxy_image function can access once patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T15:45:12.183Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a959b9ad5a09ad002780e7

Added to database: 8/23/2025, 6:03:37 AM

Last enriched: 2/26/2026, 4:38:04 PM

Last updated: 3/25/2026, 7:28:28 AM

Views: 132

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses