CVE-2023-3219

MEDIUM NUCLEI

Eventon < 2.1.2 - IDOR

Title source: rule

Description

The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post.

Exploits (1)

exploitdb WORKING POC
by Miguel Santareno · textwebappsphp
https://www.exploit-db.com/exploits/51659

Nuclei Templates (1)

EventON Lite < 2.1.2 - Arbitrary File Download
MEDIUMVERIFIEDby r3Y3r53
Shodan: http.html:/wp-content/plugins/eventon/ || http.html:/wp-content/plugins/eventon-lite/
FOFA: wp-content/plugins/eventon/ || body=/wp-content/plugins/eventon/ || body=/wp-content/plugins/eventon-lite/

Scores

CVSS v3 5.3
EPSS 0.7402
EPSS Percentile 98.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Details

CWE
CWE-639
Status published
Products (1)
myeventon/eventon < 2.1.2
Published Jul 10, 2023
Tracked Since Feb 18, 2026