CVE-2025-7813: CWE-918 Server-Side Request Forgery (SSRF) in arraytics Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin
The Events Calendar, Event Booking, Registrations and Event Tickets – Eventin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.37 via the proxy_image function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2025-7813 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting the Eventin plugin for WordPress, developed by arraytics. This plugin provides AI-powered event management, including event calendars, booking, registrations, and ticketing functionalities. The vulnerability exists in all versions up to and including 4.0.37, specifically within the proxy_image function. SSRF vulnerabilities allow an attacker to abuse the server to make HTTP requests to arbitrary internal or external resources. In this case, an unauthenticated attacker can exploit the flaw to send crafted requests originating from the vulnerable web application to arbitrary locations, including internal network services that are otherwise inaccessible externally. This can lead to unauthorized querying and modification of internal service data, potentially exposing sensitive information or enabling further attacks such as lateral movement within the network. The CVSS 3.1 base score of 7.2 reflects the vulnerability's high severity, with characteristics including network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in mid-July 2025 and published in late August 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations using WordPress websites with the Eventin plugin, this SSRF vulnerability poses significant risks. Attackers can leverage the vulnerability to access internal services behind firewalls, such as internal APIs, databases, or cloud metadata services, which are typically inaccessible externally. This can lead to data leakage, unauthorized data modification, or reconnaissance for further attacks. Organizations managing sensitive event data, customer information, or payment details through this plugin are particularly at risk. The ability to perform SSRF without authentication and without user interaction increases the likelihood of automated exploitation attempts. Additionally, the scope change means that the attacker can affect resources beyond the web server itself, potentially compromising internal network segments. This can have regulatory implications under GDPR if personal data is exposed or manipulated. The absence of known exploits in the wild provides a window for mitigation, but the high severity score demands prompt action to prevent exploitation. The impact on availability is minimal, but the confidentiality and integrity risks are substantial, especially for organizations relying heavily on the Eventin plugin for event management and ticketing.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Eventin plugin and its version. If the plugin is installed and is version 4.0.37 or earlier, organizations should prioritize upgrading to a patched version once available. In the absence of an official patch, temporary mitigations include disabling or removing the plugin if event management functionality is not critical or can be temporarily suspended. Web application firewalls (WAFs) should be configured to detect and block suspicious requests targeting the proxy_image function or unusual SSRF patterns. Network segmentation should be enforced to limit the web server's ability to access sensitive internal services, reducing the impact of SSRF exploitation. Monitoring and logging of outbound HTTP requests from the web server should be enhanced to detect anomalous internal or external requests. Additionally, organizations should review internal services to ensure they are not overly trusting requests originating from the web server, implementing strict authentication and access controls. Finally, security teams should stay alert for updates from the vendor and threat intelligence sources to apply patches promptly and monitor for emerging exploit activity.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7813: CWE-918 Server-Side Request Forgery (SSRF) in arraytics Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin
Description
The Events Calendar, Event Booking, Registrations and Event Tickets – Eventin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.37 via the proxy_image function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI-Powered Analysis
Technical Analysis
CVE-2025-7813 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting the Eventin plugin for WordPress, developed by arraytics. This plugin provides AI-powered event management, including event calendars, booking, registrations, and ticketing functionalities. The vulnerability exists in all versions up to and including 4.0.37, specifically within the proxy_image function. SSRF vulnerabilities allow an attacker to abuse the server to make HTTP requests to arbitrary internal or external resources. In this case, an unauthenticated attacker can exploit the flaw to send crafted requests originating from the vulnerable web application to arbitrary locations, including internal network services that are otherwise inaccessible externally. This can lead to unauthorized querying and modification of internal service data, potentially exposing sensitive information or enabling further attacks such as lateral movement within the network. The CVSS 3.1 base score of 7.2 reflects the vulnerability's high severity, with characteristics including network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in mid-July 2025 and published in late August 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations using WordPress websites with the Eventin plugin, this SSRF vulnerability poses significant risks. Attackers can leverage the vulnerability to access internal services behind firewalls, such as internal APIs, databases, or cloud metadata services, which are typically inaccessible externally. This can lead to data leakage, unauthorized data modification, or reconnaissance for further attacks. Organizations managing sensitive event data, customer information, or payment details through this plugin are particularly at risk. The ability to perform SSRF without authentication and without user interaction increases the likelihood of automated exploitation attempts. Additionally, the scope change means that the attacker can affect resources beyond the web server itself, potentially compromising internal network segments. This can have regulatory implications under GDPR if personal data is exposed or manipulated. The absence of known exploits in the wild provides a window for mitigation, but the high severity score demands prompt action to prevent exploitation. The impact on availability is minimal, but the confidentiality and integrity risks are substantial, especially for organizations relying heavily on the Eventin plugin for event management and ticketing.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Eventin plugin and its version. If the plugin is installed and is version 4.0.37 or earlier, organizations should prioritize upgrading to a patched version once available. In the absence of an official patch, temporary mitigations include disabling or removing the plugin if event management functionality is not critical or can be temporarily suspended. Web application firewalls (WAFs) should be configured to detect and block suspicious requests targeting the proxy_image function or unusual SSRF patterns. Network segmentation should be enforced to limit the web server's ability to access sensitive internal services, reducing the impact of SSRF exploitation. Monitoring and logging of outbound HTTP requests from the web server should be enhanced to detect anomalous internal or external requests. Additionally, organizations should review internal services to ensure they are not overly trusting requests originating from the web server, implementing strict authentication and access controls. Finally, security teams should stay alert for updates from the vendor and threat intelligence sources to apply patches promptly and monitor for emerging exploit activity.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-18T15:45:12.183Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a959b9ad5a09ad002780e7
Added to database: 8/23/2025, 6:03:37 AM
Last enriched: 8/31/2025, 1:05:38 AM
Last updated: 10/7/2025, 1:48:23 PM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.