Description
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Published: 2026-03-10
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a path traversal flaw in the ajax_create_import function of The Events Calendar plugin. It allows an authenticated user with Author‑level or higher privileges to craft a request that reads the contents of any file on the server. This can expose sensitive configuration, credentials, or other confidential data and represents a significant compromise of data confidentiality.

Affected Systems

The affected product is the WordPress plugin The Events Calendar. All releases up to and including version 6.15.17 are vulnerable. The flaw exists in the code handling the AJAX import feature that is used by site administrators and authors to import events from external sources.

Risk and Exploitability

The CVSS base score of 7.5 classifies the issue as high severity, indicating that once exploited, an attacker gains non‑privileged read access to arbitrary files. The EPSS score of less than 1% suggests that, as of the latest analysis, exploitation is unlikely to be widespread, and the flaw is not listed in the CISA KEV catalog. Nevertheless, because the flaw requires only an Author‑level account, which is common on many sites, the attack state is realistic for any site that allows authors to use the import feature. Successful exploitation would provide the attacker with data that could be used for further compromise or exploitation of other services running on the same server.

Generated by OpenCVE AI on April 15, 2026 at 17:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade The Events Calendar to version 6.15.18 or later.
  • Revoke Author‑level permissions from users who do not need them and assign the lowest effective role.
  • Reconfigure the site or server to restrict access to the ajax_create_import endpoint, for example by limiting it to administrators only or by blocking the endpoint through a security plugin or server rule.

Generated by OpenCVE AI on April 15, 2026 at 17:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
References

Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Stellarwp
Stellarwp the Events Calendar
Wordpress
Wordpress wordpress
Vendors & Products Stellarwp
Stellarwp the Events Calendar
Wordpress
Wordpress wordpress

Tue, 10 Mar 2026 03:45:00 +0000

Type Values Removed Values Added
Description The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title The Events Calendar <= 6.15.17 - Authenticated (Author+) Arbitrary File Read via ajax_create_import
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Stellarwp The Events Calendar
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:33.116Z

Reserved: 2026-03-05T06:16:21.181Z

Link: CVE-2026-3585

cve-icon Vulnrichment

Updated: 2026-03-10T15:58:04.006Z

cve-icon NVD

Status : Deferred

Published: 2026-03-10T17:40:37.773

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-3585

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:45:10Z

Weaknesses