CVE-2024-6033

4.3 MEDIUM

📋 TL;DR

This vulnerability in the Eventin WordPress plugin allows authenticated attackers with Contributor-level access or higher to import unauthorized data (events, speakers, schedules, attendee data) due to a missing capability check. It affects all versions up to and including 4.0.4. Any WordPress site using the vulnerable plugin is at risk.

💻 Affected Systems

Products:
  • Event Manager, Events Calendar, Tickets, Registrations – Eventin WordPress plugin
Versions: All versions up to and including 4.0.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the Eventin plugin installed and at least one user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could import malicious or spam events, speakers, and attendee data, potentially compromising event integrity, injecting malicious content, or harvesting sensitive attendee information.

🟠

Likely Case

Unauthorized users import fake events or speakers to disrupt legitimate event management, create confusion, or deface event listings.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minor data integrity issues that can be audited and reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward due to missing capability checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.5

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3117477/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Eventin' plugin and click 'Update Now'. 4. Verify update to version 4.0.5 or later.

🔧 Temporary Workarounds

Restrict user roles

all

Temporarily limit Contributor and higher role assignments to trusted users only.

Disable plugin

linux

Deactivate the Eventin plugin if not critically needed until patched.

wp plugin deactivate wp-event-solution

🧯 If You Can't Patch

  • Remove Contributor and higher roles from untrusted users.
  • Implement web application firewall (WAF) rules to block suspicious import requests.

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins. If version is 4.0.4 or lower, it is vulnerable.

Check Version:

wp plugin get wp-event-solution --field=version

Verify Fix Applied:

Confirm plugin version is 4.0.5 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=import_file
  • Unexpected new events, speakers, or attendees in plugin logs

Network Indicators:

  • HTTP POST requests to admin-ajax.php with import parameters from non-admin IPs

SIEM Query:

source="wordpress.log" AND "action=import_file" AND user_role IN ("contributor", "author", "editor")

🔗 References

📤 Share & Export