CVE-2023-3219
MEDIUM NUCLEIEventon < 2.1.2 - IDOR
Title source: ruleDescription
The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post.
Exploits (1)
exploitdb
WORKING POC
by Miguel Santareno · textwebappsphp
https://www.exploit-db.com/exploits/51659
Nuclei Templates (1)
EventON Lite < 2.1.2 - Arbitrary File Download
MEDIUMVERIFIEDby r3Y3r53
Shodan:
http.html:/wp-content/plugins/eventon/ || http.html:/wp-content/plugins/eventon-lite/
FOFA:
wp-content/plugins/eventon/ || body=/wp-content/plugins/eventon/ || body=/wp-content/plugins/eventon-lite/
Scores
CVSS v3
5.3
EPSS
0.7402
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Details
CWE
CWE-639
Status
published
Products (1)
myeventon/eventon
< 2.1.2
Published
Jul 10, 2023
Tracked Since
Feb 18, 2026