CVE-2025-26964
📋 TL;DR
This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affects WordPress sites using the Eventin plugin (formerly WP Event Solution) from unknown versions through 4.0.20. Attackers can potentially read sensitive files or execute code depending on server configuration.
💻 Affected Systems
- Themewinter Eventin (formerly WP Event Solution)
📦 What is this software?
Eventin by Themewinter
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete server compromise, data theft, or website defacement if PHP files can be included and executed.
Likely Case
Local file inclusion allowing reading of sensitive files like configuration files, logs, or source code containing credentials.
If Mitigated
Limited file disclosure if proper file permissions and PHP security settings restrict included file execution.
🎯 Exploit Status
Exploitation requires understanding of PHP file inclusion vulnerabilities and may need authentication depending on vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.0.21 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Eventin' plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
WordPressTemporarily disable Eventin plugin until patched
wp plugin deactivate eventin
PHP security hardening
PHPSet PHP open_basedir restrictions and disable dangerous functions
open_basedir = /var/www/html
disable_functions = exec,passthru,shell_exec,system
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block file inclusion patterns
- Restrict file permissions and implement strict access controls on sensitive files
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Eventin version. If version is 4.0.20 or earlier and no 'n/a' in version history, system is vulnerable.
Check Version:
wp plugin get eventin --field=version
Verify Fix Applied:
Verify Eventin plugin version is 4.0.21 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual PHP include/require statements in web server logs
- Requests with file path traversal patterns (../, ..\)
- Access to sensitive files via web paths
Network Indicators:
- HTTP requests with file inclusion parameters
- Unusual file paths in URL parameters
SIEM Query:
web.url:*include* OR web.url:*require* OR web.url:*..* AND web.url:*php*