Impact
The Eventin plugin for WordPress contains a vulnerability that allows unauthenticated attackers to read arbitrary files on the server through the proxy_image() function, exposing sensitive data. The flaw is a classic CWE-73 path traversal issue that can be exploited by sending crafted requests to the plugin’s proxy image endpoint, resulting in file disclosure without authentication.
Affected Systems
WordPress sites using the Eventin – Event Calendar, Tickets & Booking plugin from arraytics, version 4.0.26 or earlier. The vulnerability affects all WordPress installations that have the plugin enabled.
Risk and Exploitability
The CVSS score is 7.5 indicating a high severity, while the EPSS score of less than 1% suggests a low likelihood of current exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can achieve disclosure of arbitrary files with no credentials, making the risk primarily to confidentiality. There are no known active exploits, but the existence of the flaw mandates remediation.
OpenCVE Enrichment
EUVD