CVE-2026-25312
Received Received - Intake
Missing Authorization in EventPrime Allows Unauthorized Access

Publication date: 2026-03-19

Last updated on: 2026-04-29

Assigner: Patchstack

Description
Missing Authorization vulnerability in Metagauss EventPrime eventprime-event-calendar-management allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through <= 4.2.8.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-19
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
patchstack eventprime From 4.2.0 (inc) to 4.2.8.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-25312 is a broken access control vulnerability in the WordPress EventPrime plugin versions up to and including 4.2.8.3.

This issue arises from missing authorization, authentication, or nonce token checks in certain functions, allowing unauthenticated users to perform actions reserved for higher-privileged users.

The vulnerability has a CVSS score of 7.5, indicating a moderate severity level, and is classified under OWASP Top 10 category A1: Broken Access Control.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated attackers to perform privileged actions without proper authorization.

Although the impact is considered low priority and unlikely to be exploited with significant effect, such vulnerabilities are commonly used in mass-exploit campaigns targeting numerous websites indiscriminately.

If exploited, it could lead to unauthorized changes or actions within the EventPrime plugin, potentially compromising the integrity of the affected website.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability arises from missing authorization and authentication checks in the EventPrime WordPress plugin up to version 4.2.8.3, allowing unauthenticated users to perform privileged actions.'}, {'type': 'paragraph', 'content': 'There is no specific detection command or network signature provided in the available resources.'}, {'type': 'paragraph', 'content': 'To detect if your system is vulnerable, you should check the installed version of the EventPrime plugin on your WordPress site.'}, {'type': 'list_item', 'content': 'Use the WordPress admin dashboard to verify the EventPrime plugin version.'}, {'type': 'list_item', 'content': "Alternatively, run the following command in your WordPress installation directory to check the plugin version: `grep 'Version:' wp-content/plugins/eventprime-event-calendar-management/readme.txt`"}, {'type': 'paragraph', 'content': 'If the version is 4.2.8.3 or earlier, your system is vulnerable.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary and immediate mitigation step is to update the EventPrime plugin to version 4.2.8.4 or later, where the vulnerability has been patched.

If an immediate update is not possible, consider temporarily disabling the EventPrime plugin to prevent exploitation.

Additionally, ensure that your WordPress installation and other plugins are kept up to date to reduce exposure to similar vulnerabilities.

Using automated update tools or services like Patchstack can help rapidly mitigate vulnerabilities in affected installations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart