Impact
This vulnerability is caused by improper control of a filename used in a PHP include/require statement. It permits a Local File Inclusion that may allow attackers to read sensitive files or execute arbitrary code. The weakness is identified as CWE‑98.
Affected Systems
The plugin "Eventin" by Arraytics, bundled as a WordPress plugin, is affected in all versions from the first release through 4.0.25, inclusive. Newer releases (4.0.26 and beyond) are presumed fixed.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, but the EPSS score is below 1 %, meaning the current likelihood of exploitation is low. The vulnerability is not listed in CISA’s KEV catalog. Exploitation typically requires an attacker to supply a crafted filename or path that the plugin will include. An attacker who can influence that input could read local files or potentially run code if the plugin does not properly validate the path.
OpenCVE Enrichment
EUVD