CVE-2024-31275

8.2 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the EventPrime WordPress plugin that allows attackers to manipulate booking prices without proper authentication. It affects all EventPrime installations from unknown versions through 3.3.4. WordPress site administrators using this plugin are affected.

💻 Affected Systems

Products:
  • EventPrime WordPress Plugin
Versions: n/a through 3.3.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with EventPrime plugin in vulnerable versions, regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could book events for free or at manipulated prices, causing direct financial loss to event organizers and potentially disrupting event management systems.

🟠

Likely Case

Unauthorized users manipulate booking prices to obtain discounted or free event tickets, leading to revenue loss for event organizers.

🟢

If Mitigated

With proper authorization controls, only authenticated users with appropriate permissions can modify booking prices, preventing unauthorized manipulation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically have low exploitation complexity and can be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.5 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-3-4-booking-price-manipulation-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find EventPrime and click 'Update Now'. 4. Verify update to version 3.3.5 or later.

🔧 Temporary Workarounds

Disable EventPrime Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate eventprime-event-calendar-management

Restrict Access to Booking Pages

all

Use web application firewall or access controls to restrict unauthorized access to booking functionality

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for booking-related endpoints
  • Deploy web application firewall rules to detect and block price manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > EventPrime version. If version is 3.3.4 or earlier, system is vulnerable.

Check Version:

wp plugin get eventprime-event-calendar-management --field=version

Verify Fix Applied:

Verify EventPrime plugin version is 3.3.5 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual booking price modifications
  • Booking requests from unauthenticated users
  • Multiple booking attempts with manipulated prices

Network Indicators:

  • HTTP POST requests to booking endpoints without authentication
  • Unusual patterns in booking API calls

SIEM Query:

source="wordpress.log" AND ("eventprime" OR "booking") AND ("price" OR "cost") AND status="200" AND user="-"

🔗 References

📤 Share & Export