Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack

Posted on May 17, 2025May 17, 2025 By CWS

A extreme privilege escalation vulnerability has been found within the in style WordPress plugin Eventin, placing greater than 10,000 web sites liable to full compromise.

The vulnerability, now tracked as CVE-2025-47539, permits unauthenticated attackers to create administrator accounts with none consumer interplay, giving them full management over affected web sites.

Safety researchers are urging web site homeowners to replace instantly to model 4.0.27, which incorporates a patch for this vital safety flaw.

The Eventin plugin, developed by Themewinter, is broadly used for occasion administration functionalities on WordPress websites.

Its in depth adoption throughout hundreds of internet sites makes this vulnerability notably regarding, as profitable exploitation may result in web site defacement, knowledge theft, malware injection, or use of the compromised websites in bigger botnet operations.

Patchstack researchers recognized that the vulnerability stems from an improperly secured REST API endpoint within the Eventin plugin that handles speaker imports.

The Vulnerability

The vulnerability was initially reported on April 19, 2025, by means of Patchstack’s Zero Day bug bounty program by safety researcher Denver Jackson, who acquired a $600 USD reward for the invention.

What makes this vulnerability notably harmful is its unauthenticated nature, requiring no login credentials or social engineering to take advantage of.

An attacker merely must ship a specifically crafted request to the susceptible endpoint to create an administrator-level account, after which they will entry the positioning’s admin dashboard by performing a password reset.

The technical evaluation reveals that the vulnerability exists within the /wp-json/eventin/v2/audio system/import REST API endpoint.

The core concern lies within the import_item_permissions_check() operate, which was carried out to easily return true with out performing any precise permission validation:-

public operate import_item_permissions_check($request) {
return true;
}

This implementation permits any unauthenticated consumer to entry the endpoint. Mixed with an absence of position validation when processing imported consumer knowledge, attackers may submit a CSV file containing their particulars with an administrator position specification:-

$args = [
‘first_name’ => !empty($row[‘name’]) ? $row[‘name’] : ”,
// Different consumer particulars…
‘position’ => !empty($row[‘role’]) ? $row[‘role’] : ”,
];

Themewinter addressed the vulnerability in model 4.0.27, launched on April 30, 2025, by implementing correct permission checks and limiting the allowed roles throughout consumer imports:

public operate import_item_permissions_check($request)

WordPress web site directors utilizing the Eventin plugin are strongly suggested to replace to model 4.0.27 or later instantly.

These unable to replace ought to think about quickly disabling the plugin till updates might be utilized, because the unauthenticated nature of this exploit makes it notably harmful within the wild.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:10K, Attack, Critical, Cyber, Exposes, Plugin, Sites, Vulnerability, WordPress

Post navigation

Previous Post: Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication
Next Post: 10 Best NGINX Monitoring Tools

Related Posts

Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection Cyber Security News
INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia Cyber Security News
Microsoft Edge for Android Adds InPrivate Tab Locking with PIN & Bio Authentication Cyber Security News
CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
CISOs Guide to Navigating the 2025 Threat Landscape Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News