5.3

CVE-2023-3219

Exploit

EventON <= 2.1 - Insecure Direct Object Reference to Unauthorized Post Access

The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post.
Mögliche Gegenmaßnahme
EventON (Pro) - WordPress Virtual Event Calendar Plugin: Update to version 4.4, or a newer patched version
EventON – Events Calendar: Update to version 2.1.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt EventON (Pro) - WordPress Virtual Event Calendar Plugin
Version [*, 4.4)
SystemWordPress Plugin
Produkt EventON – Events Calendar
Version *-2.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MyeventonEventon SwPlatformwordpress Version < 2.1.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 74.71% 0.988
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-639 Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.