Home

Description

The EventPrime plugin for WordPress is vulnerable to unauthorized post modification due to missing authorization checks in all versions up to, and including, 4.2.8.4. This is due to the save_frontend_event_submission function accepting a user-controlled event_id parameter and updating the corresponding event post without enforcing ownership or capability checks. This makes it possible for authenticated (Customer+) attackers to modify posts created by administrators by manipulating the event_id parameter granted they can obtain a valid nonce.

PUBLISHED Reserved 2026-01-29 | Published 2026-02-18 | Updated 2026-02-18 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-01-29:Vendor Notified
2026-02-17:Disclosed

Credits

Supoj Polsawas finder

References

www.wordfence.com/...-1309-4aad-8411-4445efea2b66?source=cve

plugins.trac.wordpress.org/...unk/includes/class-ep-ajax.php

plugins.trac.wordpress.org/...unk/includes/class-ep-ajax.php

plugins.trac.wordpress.org/...8.1/includes/class-ep-ajax.php

plugins.trac.wordpress.org/...8.1/includes/class-ep-ajax.php

plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=

cve.org (CVE-2026-1655)

nvd.nist.gov (CVE-2026-1655)

Download JSON