Home

Description

The EventPrime plugin for WordPress is vulnerable to unauthorized image file upload in all versions up to, and including, 4.2.8.4. This is due to the plugin registering the upload_file_media AJAX action as publicly accessible (nopriv-enabled) without implementing any authentication, authorization, or nonce verification despite a nonce being created. This makes it possible for unauthenticated attackers to upload image files to the WordPress uploads directory and create Media Library attachments via the ep_upload_file_media endpoint.

PUBLISHED Reserved 2026-01-29 | Published 2026-02-17 | Updated 2026-02-17 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-01-29:Vendor Notified
2026-02-16:Disclosed

Credits

Tharadol Suksamran finder

References

www.wordfence.com/...-0d37-4040-b8fc-84d29534a4b7?source=cve

plugins.trac.wordpress.org/...unk/includes/class-ep-ajax.php

plugins.trac.wordpress.org/...8.1/includes/class-ep-ajax.php

plugins.trac.wordpress.org/...-event-calendar-management.php

plugins.trac.wordpress.org/...-event-calendar-management.php

plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=

cve.org (CVE-2026-1657)

nvd.nist.gov (CVE-2026-1657)

Download JSON