Vulnerabilities > CVE-2023-3219 - Authorization Bypass Through User-Controlled Key vulnerability in Myeventon Eventon
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
NONE Availability impact
NONE Summary
The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- http://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
- http://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
- https://wpscan.com/vulnerability/72d80887-0270-4987-9739-95b1a178c1fd
- https://wpscan.com/vulnerability/72d80887-0270-4987-9739-95b1a178c1fd