First published: Wed Mar 13 2024(Updated: )
The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the booking_export_all() function in all versions up to, and including, 3.4.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve all event booking which can contain PII.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metagauss EventPrime | <3.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1127 is considered a high severity vulnerability due to the potential for unauthorized access to sensitive booking data.
To fix CVE-2024-1127, update the EventPrime plugin to version 3.4.2 or later, which includes the necessary capability checks.
Users of the EventPrime plugin for WordPress, specifically those using versions up to and including 3.4.1, are affected by CVE-2024-1127.
CVE-2024-1127 is a vulnerability related to unauthorized access due to missing capability checks in the booking_export_all() function.
No, only authenticated users with certain privileges can exploit CVE-2024-1127 to access restricted data.