CVE-2025-4796

The Eventin plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.34. This is due to the plugin not properly validating a user's identity or capability prior to updating their details like email in the 'Eventin\Speaker\Api\SpeakerController::update_item' function. This makes it possible for unauthenticated attackers with contributor-level and above permissions to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*

History

13 Aug 2025, 19:31

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.28/core/speaker/Api/SpeakerController.php#L419 - () https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.28/core/speaker/Api/SpeakerController.php#L419 - Product
References () https://plugins.trac.wordpress.org/changeset/3336972/wp-event-solution/trunk/core/speaker/Api/SpeakerController.php#file0 - () https://plugins.trac.wordpress.org/changeset/3336972/wp-event-solution/trunk/core/speaker/Api/SpeakerController.php#file0 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/9e0d441d-1da5-45e7-8a14-ce178099c0cc?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/9e0d441d-1da5-45e7-8a14-ce178099c0cc?source=cve - Third Party Advisory
CPE cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*
First Time Themewinter eventin
Themewinter
Summary
  • (es) El complemento Eventin para WordPress es vulnerable a la escalada de privilegios mediante la apropiación de cuentas en todas las versiones hasta la 4.0.34 incluida. Esto se debe a que el complemento no valida correctamente la identidad o la capacidad del usuario antes de actualizar sus datos, como el correo electrónico, en la función 'Eventin\Speaker\Api\SpeakerController::update_item'. Esto permite que atacantes no autenticados con permisos de colaborador o superiores cambien las direcciones de correo electrónico de usuarios arbitrarios, incluidos los administradores, y aprovechen esta situación para restablecer la contraseña del usuario y acceder a su cuenta.

08 Aug 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-08 19:15

Updated : 2025-08-13 19:31


NVD link : CVE-2025-4796

Mitre link : CVE-2025-4796

CVE.ORG link : CVE-2025-4796


JSON object : View

Products Affected

themewinter

  • eventin
CWE
CWE-639

Authorization Bypass Through User-Controlled Key