First published: Mon Feb 03 2025(Updated: )
The Eventer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'eventer_export_bookings_csv' function in all versions up to, and including, 3.9.9. This makes it possible for authenticated attackers with subscriber-level permissions or above, to download bookings, which contains customers' personal data.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Eventer | <=3.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11134 is considered a medium severity vulnerability due to the potential unauthorized access it allows.
To fix CVE-2024-11134, update the Eventer plugin to version 4.0 or later, which addresses the missing capability check.
CVE-2024-11134 affects all versions of the Eventer plugin for WordPress up to and including version 3.9.9.
The impact of CVE-2024-11134 is that authenticated attackers with subscriber-level permissions can access sensitive booking data.
Yes, a patch for CVE-2024-11134 is included in the updated version 4.0 of the Eventer plugin.