Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3585: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in stellarwp The Events Calendar

0
High
VulnerabilityCVE-2026-3585cvecve-2026-3585cwe-22
Published: Tue Mar 10 2026 (03/10/2026, 03:33:51 UTC)
Source: CVE Database V5
Vendor/Project: stellarwp
Product: The Events Calendar

Description

CVE-2026-3585 is a high-severity path traversal vulnerability in the WordPress plugin The Events Calendar by stellarwp, affecting all versions up to 6. 15. 17. It allows authenticated users with Author-level or higher privileges to exploit the 'ajax_create_import' function to read arbitrary files on the server. This can lead to exposure of sensitive information without requiring user interaction or elevated privileges beyond Author access. The vulnerability does not affect system integrity or availability but poses a significant confidentiality risk. No known public exploits are reported yet. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential data breaches. The vulnerability is remotely exploitable over the network without additional authentication barriers beyond Author-level access. Countries with large WordPress user bases and significant adoption of this plugin are at higher risk.

AI-Powered Analysis

AILast updated: 03/10/2026, 04:03:34 UTC

Technical Analysis

CVE-2026-3585 is a path traversal vulnerability classified under CWE-22 found in the popular WordPress plugin The Events Calendar by stellarwp. This vulnerability exists in all versions up to and including 6.15.17 and is triggered via the 'ajax_create_import' function. The flaw allows an authenticated attacker with Author-level permissions or higher to manipulate file path inputs improperly, bypassing directory restrictions. This enables the attacker to read arbitrary files on the web server, potentially exposing sensitive data such as configuration files, credentials, or other private information stored on the server. The vulnerability does not require elevated privileges beyond Author-level, making it accessible to a broad range of authenticated users, including contributors or editors. Exploitation is remote and does not require user interaction, increasing the risk profile. The CVSS v3.1 base score is 7.5, indicating high severity primarily due to the confidentiality impact and ease of exploitation. No integrity or availability impacts are noted. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be considered a significant risk for affected installations. The plugin is widely used in WordPress sites globally, increasing the potential attack surface. The lack of a patch link suggests mitigation or updates may be pending or need to be monitored closely.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive information stored on the server hosting the vulnerable WordPress plugin. Attackers with Author-level access can read arbitrary files, which may include database credentials, API keys, configuration files, or other sensitive data, potentially leading to further compromise of the web application or backend systems. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can facilitate subsequent attacks such as privilege escalation, data exfiltration, or lateral movement within the network. Organizations relying on The Events Calendar plugin for event management on WordPress sites face increased risk of data leakage, especially if they grant Author-level access to untrusted users or if accounts are compromised. The vulnerability's remote exploitability and lack of user interaction requirements increase the likelihood of exploitation in targeted or opportunistic attacks. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits following public disclosure. The widespread use of WordPress and this plugin means a large number of websites globally could be affected, potentially impacting businesses, non-profits, and government entities that use this software for event management.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade The Events Calendar plugin to a version that addresses CVE-2026-3585 once available from stellarwp. Until a patch is released, administrators should restrict Author-level access to trusted users only and review user roles to minimize the number of accounts with such privileges. Implementing web application firewall (WAF) rules to detect and block suspicious requests targeting the 'ajax_create_import' function can help reduce exploitation risk. Additionally, server-side hardening measures such as disabling directory listing, restricting file read permissions to only necessary files, and isolating the web server environment can limit the impact of successful exploitation. Monitoring server logs for unusual file access patterns or attempts to traverse directories can provide early detection of exploitation attempts. Regularly auditing plugin versions and applying security updates promptly is critical. Organizations should also consider implementing multi-factor authentication (MFA) for WordPress accounts to reduce the risk of account compromise. Finally, sensitive files should be stored outside the web root or protected with appropriate access controls to minimize exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-05T06:16:21.181Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69af94baea502d3aa8fe3e7a

Added to database: 3/10/2026, 3:49:14 AM

Last enriched: 3/10/2026, 4:03:34 AM

Last updated: 3/10/2026, 4:51:57 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses