First published: Wed Mar 13 2024(Updated: )
The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to payment bypass in all versions up to, and including, 3.4.2. This is due to the plugin allowing unauthenticated users to update the status of order payments. This makes it possible for unauthenticated attackers to book events for free.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metagauss EventPrime | <3.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1321 is classified as a high severity vulnerability due to its potential to allow unauthorized payment bypass.
To fix CVE-2024-1321, update the EventPrime plugin to version 3.4.3 or newer.
All users of the EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress versions up to and including 3.4.2 are affected by CVE-2024-1321.
CVE-2024-1321 is a payment bypass vulnerability that allows unauthenticated users to update order payment statuses.
Yes, CVE-2024-1321 can be exploited remotely since it allows unauthenticated users to manipulate payment statuses.