5.3
CVE-2024-11396
- EPSS 60.48%
- Veröffentlicht 14.01.2025 01:15:09
- Zuletzt bearbeitet 05.06.2025 15:21:26
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Event monster <= 1.4.3 - Information Exposure Via Visitors List Export
The Event Monster – Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.3 via the Visitors List Export file. During the export, a CSV file is created in the wp-content folder with a hardcoded filename that is publicly accessible. This makes it possible for unauthenticated attackers to extract data about event visitors, that includes first and last names, email, and phone number.
Mögliche Gegenmaßnahme
Event Monster – Manager & Ticket Booking: Update to version 1.4.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Event Monster – Manager & Ticket Booking
Version
*-1.4.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Awplife ≫ Event Monster SwPlatformwordpress Version < 1.4.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 60.48% | 0.982 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-359 Exposure of Private Personal Information to an Unauthorized Actor
The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected.