CVE-2026-1655: CWE-862 Missing Authorization in metagauss EventPrime – Events Calendar, Bookings and Tickets
The EventPrime plugin for WordPress is vulnerable to unauthorized post modification due to missing authorization checks in all versions up to, and including, 4.2.8.4. This is due to the save_frontend_event_submission function accepting a user-controlled event_id parameter and updating the corresponding event post without enforcing ownership or capability checks. This makes it possible for authenticated (Customer+) attackers to modify posts created by administrators by manipulating the event_id parameter granted they can obtain a valid nonce.
AI Analysis
Technical Summary
CVE-2026-1655 is a missing authorization vulnerability (CWE-862) in the EventPrime – Events Calendar, Bookings and Tickets WordPress plugin developed by metagauss. The vulnerability exists in all versions up to and including 4.2.8.4. The root cause is the save_frontend_event_submission function, which processes event updates on the frontend. This function accepts an event_id parameter controlled by the user and updates the corresponding event post without verifying if the authenticated user owns the event or has the necessary capabilities to modify it. Although the attacker must be authenticated with at least Customer+ privileges and possess a valid nonce, no further user interaction is required. This allows an attacker to modify event posts created by administrators or other users, compromising the integrity of event data. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the low impact on confidentiality and availability but moderate impact on integrity. The attack vector is network-based with low attack complexity and requires privileges but no user interaction. No patches or known exploits are currently available, so the vulnerability remains unmitigated in affected versions. This flaw could be leveraged to alter event details, potentially misleading attendees or disrupting event operations.
Potential Impact
For European organizations, particularly those relying on WordPress and the EventPrime plugin for managing events, bookings, and tickets, this vulnerability poses a risk to the integrity of event-related data. Unauthorized modification of event posts could lead to misinformation, scheduling conflicts, or fraudulent event details, damaging organizational reputation and trust. In sectors such as education, government, cultural institutions, and corporate event management, this could disrupt operations and stakeholder communications. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise could have cascading effects on business processes and user trust. Attackers with Customer+ privileges could exploit this to manipulate events without detection if monitoring is insufficient. The lack of patches increases exposure time, necessitating immediate compensatory controls. Organizations with high event management activity and public-facing event calendars are at greater risk.
Mitigation Recommendations
Until an official patch is released, European organizations should implement strict access controls to limit Customer+ privileges to trusted users only. Review and tighten user role assignments in WordPress to minimize the number of users with elevated permissions. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate the event_id parameter. Enable detailed logging and monitoring of event post modifications to quickly identify unauthorized changes. Consider temporarily disabling frontend event submission features if feasible or restricting them to verified users. Conduct regular audits of event content integrity and verify nonce validation mechanisms are robust. Engage with the plugin vendor for updates and apply patches promptly once available. Additionally, educate users about the risk and encourage reporting of suspicious event modifications.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2026-1655: CWE-862 Missing Authorization in metagauss EventPrime – Events Calendar, Bookings and Tickets
Description
The EventPrime plugin for WordPress is vulnerable to unauthorized post modification due to missing authorization checks in all versions up to, and including, 4.2.8.4. This is due to the save_frontend_event_submission function accepting a user-controlled event_id parameter and updating the corresponding event post without enforcing ownership or capability checks. This makes it possible for authenticated (Customer+) attackers to modify posts created by administrators by manipulating the event_id parameter granted they can obtain a valid nonce.
AI-Powered Analysis
Technical Analysis
CVE-2026-1655 is a missing authorization vulnerability (CWE-862) in the EventPrime – Events Calendar, Bookings and Tickets WordPress plugin developed by metagauss. The vulnerability exists in all versions up to and including 4.2.8.4. The root cause is the save_frontend_event_submission function, which processes event updates on the frontend. This function accepts an event_id parameter controlled by the user and updates the corresponding event post without verifying if the authenticated user owns the event or has the necessary capabilities to modify it. Although the attacker must be authenticated with at least Customer+ privileges and possess a valid nonce, no further user interaction is required. This allows an attacker to modify event posts created by administrators or other users, compromising the integrity of event data. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the low impact on confidentiality and availability but moderate impact on integrity. The attack vector is network-based with low attack complexity and requires privileges but no user interaction. No patches or known exploits are currently available, so the vulnerability remains unmitigated in affected versions. This flaw could be leveraged to alter event details, potentially misleading attendees or disrupting event operations.
Potential Impact
For European organizations, particularly those relying on WordPress and the EventPrime plugin for managing events, bookings, and tickets, this vulnerability poses a risk to the integrity of event-related data. Unauthorized modification of event posts could lead to misinformation, scheduling conflicts, or fraudulent event details, damaging organizational reputation and trust. In sectors such as education, government, cultural institutions, and corporate event management, this could disrupt operations and stakeholder communications. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise could have cascading effects on business processes and user trust. Attackers with Customer+ privileges could exploit this to manipulate events without detection if monitoring is insufficient. The lack of patches increases exposure time, necessitating immediate compensatory controls. Organizations with high event management activity and public-facing event calendars are at greater risk.
Mitigation Recommendations
Until an official patch is released, European organizations should implement strict access controls to limit Customer+ privileges to trusted users only. Review and tighten user role assignments in WordPress to minimize the number of users with elevated permissions. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate the event_id parameter. Enable detailed logging and monitoring of event post modifications to quickly identify unauthorized changes. Consider temporarily disabling frontend event submission features if feasible or restricting them to verified users. Conduct regular audits of event content integrity and verify nonce validation mechanisms are robust. Engage with the plugin vendor for updates and apply patches promptly once available. Additionally, educate users about the risk and encourage reporting of suspicious event modifications.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-29T19:20:41.453Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69956e1c80d747be20503e12
Added to database: 2/18/2026, 7:45:32 AM
Last enriched: 2/18/2026, 8:01:40 AM
Last updated: 2/21/2026, 12:17:35 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.