CVE-2025-14507
📋 TL;DR
The EventPrime WordPress plugin exposes sensitive booking data through its REST API to unauthenticated attackers when the API is enabled. This vulnerability allows extraction of user names, email addresses, ticket details, payment information, and order keys. All WordPress sites using EventPrime versions up to 4.2.7.0 with the REST API enabled are affected.
💻 Affected Systems
- EventPrime - Events Calendar, Bookings and Tickets for WordPress
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Mass data breach exposing PII, payment details, and booking information leading to identity theft, financial fraud, and regulatory penalties.
Likely Case
Unauthenticated attackers harvesting user email addresses and booking details for spam, phishing campaigns, or targeted attacks.
If Mitigated
Limited exposure if API is disabled or proper access controls are implemented, though some data may still be accessible.
🎯 Exploit Status
Exploitation requires simple HTTP requests to REST API endpoints. No authentication needed when API is enabled.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.2.7.0 (partial fix), check for newer versions
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3432454/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find EventPrime plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Disable EventPrime REST API
allCompletely disable the vulnerable REST API endpoint to prevent exploitation
Navigate to EventPrime settings in WordPress admin and disable REST API functionality
Restrict API Access
linuxUse web application firewall or .htaccess to block unauthenticated access to /wp-json/eventprime/ endpoints
Add to .htaccess: RewriteCond %{REQUEST_URI} ^/wp-json/eventprime/ [NC]
RewriteCond %{HTTP:Authorization} !^Basic [NC]
RewriteRule .* - [F,L]
🧯 If You Can't Patch
- Immediately disable the EventPrime REST API in plugin settings
- Implement network-level restrictions to block external access to /wp-json/eventprime/ endpoints
🔍 How to Verify
Check if Vulnerable:
Check if EventPrime REST API is enabled and accessible via: curl -X GET https://yoursite.com/wp-json/eventprime/v1/bookings (if returns booking data without authentication, vulnerable)
Check Version:
Check WordPress admin plugins page or use: wp plugin get eventprime-event-calendar-management --field=version
Verify Fix Applied:
After update, test same endpoint requires authentication or returns proper access denied
📡 Detection & Monitoring
Log Indicators:
- Multiple GET requests to /wp-json/eventprime/v1/* endpoints from unauthenticated users
- Unusual volume of requests to booking/order API endpoints
Network Indicators:
- Unusual traffic patterns to REST API endpoints
- Data exfiltration patterns from booking endpoints
SIEM Query:
source="web_logs" AND uri_path="/wp-json/eventprime/*" AND http_method="GET" AND user_agent NOT CONTAINS "wp-admin"
🔗 References
- https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/trunk/includes/class-eventprime-rest-api.php#L447
- https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/trunk/includes/class-eventprime-rest-api.php#L651
- https://plugins.trac.wordpress.org/changeset/3422587/
- https://plugins.trac.wordpress.org/changeset/3432454/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4b170ed1-72ee-40b6-9882-e978d630f6bb?source=cve