The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 4.0.26 via the proxy_image() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
References
Configurations
History
04 Jun 2025, 22:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/3284545/wp-event-solution/trunk/core/Admin/Hooks.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/1479071c-85c3-41fd-8ad7-f0dee32f201b?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:* | |
First Time |
Themewinter eventin
Themewinter |
08 May 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 May 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-08 06:15
Updated : 2025-06-04 22:42
NVD link : CVE-2025-3419
Mitre link : CVE-2025-3419
CVE.ORG link : CVE-2025-3419
JSON object : View
Products Affected
themewinter
- eventin
CWE
CWE-73
External Control of File Name or Path