CVE-2025-3419

The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 4.0.26 via the proxy_image() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*

History

04 Jun 2025, 22:42

Type Values Removed Values Added
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/1479071c-85c3-41fd-8ad7-f0dee32f201b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/1479071c-85c3-41fd-8ad7-f0dee32f201b?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/changeset/3284545/wp-event-solution/trunk/core/Admin/Hooks.php - () https://plugins.trac.wordpress.org/changeset/3284545/wp-event-solution/trunk/core/Admin/Hooks.php - Patch
CPE cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*
First Time Themewinter eventin
Themewinter

08 May 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-08 06:15

Updated : 2025-06-04 22:42


NVD link : CVE-2025-3419

Mitre link : CVE-2025-3419


JSON object : View

Products Affected

themewinter

  • eventin
CWE
CWE-73

External Control of File Name or Path