CVE-2025-5733

5.3 MEDIUM

📋 TL;DR

The Modern Events Calendar Lite WordPress plugin versions up to 7.21.9 expose full web server path information to unauthenticated attackers through improper validation when exporting calendars. This information disclosure vulnerability doesn't directly compromise systems but provides reconnaissance data that could aid other attacks. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Modern Events Calendar Lite WordPress plugin
Versions: All versions up to and including 7.21.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires plugin to be installed and active on WordPress site.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers combine path disclosure with another vulnerability (like file inclusion or directory traversal) to achieve remote code execution or sensitive data exposure.

🟠

Likely Case

Attackers gather reconnaissance information about server structure to plan targeted attacks against the WordPress installation.

🟢

If Mitigated

Limited to information disclosure only, with no direct system compromise if other vulnerabilities are patched.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to trigger path disclosure, but requires additional vulnerability for actual compromise.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.22.0 or later

Vendor Advisory: https://webnus.net/dox/modern-events-calendar/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Modern Events Calendar Lite. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable calendar export functionality

all

Temporarily disable the vulnerable export feature until patching

Web application firewall rule

all

Block requests to calendar export endpoints

🧯 If You Can't Patch

  • Disable or remove the Modern Events Calendar Lite plugin entirely
  • Implement strict web application firewall rules to block suspicious requests to calendar endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Modern Events Calendar Lite version. If version is 7.21.9 or lower, system is vulnerable.

Check Version:

wp plugin list --name='modern-events-calendar-lite' --field=version

Verify Fix Applied:

Confirm plugin version is 7.22.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /wp-content/plugins/modern-events-calendar-lite/app/ endpoints with export parameters
  • Multiple failed attempts to access server path information

Network Indicators:

  • HTTP requests containing 'export' or 'id' parameters targeting the Modern Events Calendar plugin endpoints

SIEM Query:

source="web_logs" AND (uri_path="/wp-content/plugins/modern-events-calendar-lite/" AND (query="*export*" OR query="*id=*"))

🔗 References

📤 Share & Export