Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Arraytics Eventin wp-event-solution allows PHP Local File Inclusion.This issue affects Eventin: from n/a through <= 4.0.20.
Published: 2025-02-25
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Local File Inclusion in the WordPress Eventin plugin occurs because file names supplied in PHP include/require statements are not properly validated. The flaw aligns with CWE‑98 and can allow an attacker to read arbitrary files on the server or, if executable code can be supplied, to run code in the web application context. Based on the description, it is inferred that the vulnerability is triggered by crafted requests that influence the inclusion logic, potentially exposing sensitive data or facilitating privilege escalation.

Affected Systems

This vulnerability affects the Arraytics Eventin (wp‑event‑solution) WordPress plugin in all releases from the earliest available version through and including 4.0.20. Any WordPress site that has the plugin installed in one of these versions is at risk.

Risk and Exploitability

The CVSS score of 7.5 signals moderate‑high severity, while the EPSS score below 1% indicates a low current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog. Attackers were inferred to exploit the flaw by sending specially crafted HTTP requests to the plugin’s endpoints that manipulate the include path, potentially reading files such as application configuration or user data, and, if writable directories exist, executing injected PHP code.

Generated by OpenCVE AI on May 2, 2026 at 04:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Eventin plugin to the latest version that contains the LFI fix.
  • If an immediate upgrade is not possible, restrict the include logic to a whitelist of trusted paths or disable it entirely, and apply strict input validation for any user‑supplied filenames.
  • Harden file permissions on the server by setting the least privilege permissions on web root directories, removing write or execute access to sensitive PHP files, and ensuring directories used by the plugin are not writable by web users.

Generated by OpenCVE AI on May 2, 2026 at 04:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5440 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter Eventin allows PHP Local File Inclusion. This issue affects Eventin: from n/a through 4.0.20.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter Eventin allows PHP Local File Inclusion. This issue affects Eventin: from n/a through 4.0.20. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Arraytics Eventin wp-event-solution allows PHP Local File Inclusion.This issue affects Eventin: from n/a through <= 4.0.20.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 11 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*

Tue, 25 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 25 Feb 2025 14:30:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themewinter Eventin allows PHP Local File Inclusion. This issue affects Eventin: from n/a through 4.0.20.
Title WordPress Eventin plugin <= 4.0.20 - Local File Inclusion vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Themewinter Eventin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:44.838Z

Reserved: 2025-02-17T11:51:33.745Z

Link: CVE-2025-26964

cve-icon Vulnrichment

Updated: 2025-02-25T14:55:52.587Z

cve-icon NVD

Status : Modified

Published: 2025-02-25T15:15:29.557

Modified: 2026-04-23T15:26:09.110

Link: CVE-2025-26964

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T04:15:06Z

Weaknesses