CVE-2024-9864

6.1 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress websites using the EventPrime plugin. When front-end users can submit events with tickets, attackers can embed scripts that execute whenever other users view those pages. All WordPress sites with EventPrime plugin versions up to 4.0.4.7 are affected.

💻 Affected Systems

Products:
  • EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress
Versions: All versions up to and including 4.0.4.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only exploitable when front-end users can submit new events with tickets. Requires the 'Allow front-end event submission' feature to be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or deploy malware to visitors' browsers.

🟠

Likely Case

Attackers will typically use this to steal admin credentials, redirect users to phishing sites, or display malicious advertisements.

🟢

If Mitigated

With proper input validation and output escaping, the malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward - attackers simply need to submit events with malicious ticket names containing JavaScript payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.4.8 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3170503/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find EventPrime plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable front-end event submission

all

Temporarily disable the feature that allows front-end users to submit events until patching is complete.

Implement WAF rules

all

Add Web Application Firewall rules to block XSS payloads in ticket name parameters.

🧯 If You Can't Patch

  • Disable the EventPrime plugin entirely until patching is possible
  • Implement strict Content Security Policy (CSP) headers to mitigate script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → EventPrime version. If version is 4.0.4.7 or lower, you are vulnerable.

Check Version:

wp plugin list --name=eventprime --field=version

Verify Fix Applied:

After updating, verify version is 4.0.4.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual event submissions with long ticket names containing script tags or JavaScript code
  • Multiple failed event submissions with suspicious payloads

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with ticket_name parameter containing script tags

SIEM Query:

source="wordpress" AND (ticket_name CONTAINS "<script>" OR ticket_name CONTAINS "javascript:" OR ticket_name CONTAINS "onerror=" OR ticket_name CONTAINS "onload=")

🔗 References

📤 Share & Export