Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack

Posted on May 17, 2025May 17, 2025 By CWS

A extreme privilege escalation vulnerability has been found within the in style WordPress plugin Eventin, placing greater than 10,000 web sites liable to full compromise.

The vulnerability, now tracked as CVE-2025-47539, permits unauthenticated attackers to create administrator accounts with none consumer interplay, giving them full management over affected web sites.

Safety researchers are urging web site homeowners to replace instantly to model 4.0.27, which incorporates a patch for this vital safety flaw.

The Eventin plugin, developed by Themewinter, is broadly used for occasion administration functionalities on WordPress websites.

Its in depth adoption throughout hundreds of internet sites makes this vulnerability notably regarding, as profitable exploitation may result in web site defacement, knowledge theft, malware injection, or use of the compromised websites in bigger botnet operations.

Patchstack researchers recognized that the vulnerability stems from an improperly secured REST API endpoint within the Eventin plugin that handles speaker imports.

The Vulnerability

The vulnerability was initially reported on April 19, 2025, by means of Patchstack’s Zero Day bug bounty program by safety researcher Denver Jackson, who acquired a $600 USD reward for the invention.

What makes this vulnerability notably harmful is its unauthenticated nature, requiring no login credentials or social engineering to take advantage of.

An attacker merely must ship a specifically crafted request to the susceptible endpoint to create an administrator-level account, after which they will entry the positioning’s admin dashboard by performing a password reset.

The technical evaluation reveals that the vulnerability exists within the /wp-json/eventin/v2/audio system/import REST API endpoint.

The core concern lies within the import_item_permissions_check() operate, which was carried out to easily return true with out performing any precise permission validation:-

public operate import_item_permissions_check($request) {
return true;
}

This implementation permits any unauthenticated consumer to entry the endpoint. Mixed with an absence of position validation when processing imported consumer knowledge, attackers may submit a CSV file containing their particulars with an administrator position specification:-

$args = [
‘first_name’ => !empty($row[‘name’]) ? $row[‘name’] : ”,
// Different consumer particulars…
‘position’ => !empty($row[‘role’]) ? $row[‘role’] : ”,
];

Themewinter addressed the vulnerability in model 4.0.27, launched on April 30, 2025, by implementing correct permission checks and limiting the allowed roles throughout consumer imports:

public operate import_item_permissions_check($request)

WordPress web site directors utilizing the Eventin plugin are strongly suggested to replace to model 4.0.27 or later instantly.

These unable to replace ought to think about quickly disabling the plugin till updates might be utilized, because the unauthenticated nature of this exploit makes it notably harmful within the wild.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:10K, Attack, Critical, Cyber, Exposes, Plugin, Sites, Vulnerability, WordPress

Post navigation

Previous Post: Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication
Next Post: 10 Best NGINX Monitoring Tools

Related Posts

SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups Cyber Security News
Adobe’s August 2025 Patch Tuesday Cyber Security News
New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools Cyber Security News
McLaren Health Care Data Breach Exposes 743,000 People Personal Information Cyber Security News
CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild Cyber Security News
Glasgow City Warns of Parking Fine Scam as Cyber Security Incident Continues Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News