EventPrime – Events Calendar, Bookings and Tickets

Information

Software Type Plugin
Software Slug eventprime-event-calendar-management (view on wordpress.org)
Software Status Active
Software Author metagauss
Software Website theeventprime.com
Software Downloads 275,372
Software Active Installs 4,000
Software Record Last Updated December 13, 2024

Showing 1-20 of 25 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
EventPrime – Modern Events Calendar, Bookings and Tickets <= 4.0.4.7 - Unauthenticated Stored Cross-Site Scripting Patched CVE-2024-9864 6.1 zer0gh0st October 23, 2024
EventPrime – Modern Events Calendar, Bookings and Tickets <= 4.0.4.7 - Unauthenticated Stored Cross-Site Scripting via Transaction Log Patched CVE-2024-9865 6.1 zer0gh0st October 23, 2024
EventPrime <= 4.0.4.5 - Open Redirect Patched CVE-2024-47648 6.1 ardias September 30, 2024
EventPrime <= 4.0.4.3 - Missing Authorization to Unauthenticated Private or Password-Protected Events Disclosure Patched CVE-2024-8369 5.3 Miguel Santareno September 9, 2024
EventPrime <= 4.0.3.2 - Missing Authorization via calendar_event_create() Patched CVE-2024-43223 5.3 Trương Hữu Phúc (truonghuuphuc) August 9, 2024
EventPrime <= 3.3.4 - Missing Authorization to Booking Price Maniputlation Patched CVE-2024-31275 5.3 Joshua Chan April 5, 2024
EventPrime <= 3.3.9 - Authenticated (Administrator+) Stored Cross-Site Scripting Patched CVE-2024-29776 5.5 Mochamad Sofyan March 25, 2024
EventPrime – Events Calendar, Bookings and Tickets <= 3.4.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Deletion Patched CVE-2024-1125 5.4 Lucio Sá March 8, 2024
EventPrime – Events Calendar, Bookings and Tickets <= 3.4.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Email Sending Patched CVE-2024-1124 4.3 Lucio Sá March 8, 2024
EventPrime – Events Calendar, Bookings and Tickets <= 3.4.2 - Missing Authorization to Arbitrary Post Overwrite Patched CVE-2024-1123 6.5 Lucio Sá March 8, 2024
EventPrime – Events Calendar, Bookings and Tickets <= 3.4.2 - Unauthenticated Booking Payment Bypass Patched CVE-2024-1321 5.3 Lucio Sá March 8, 2024
EventPrime – Events Calendar, Bookings and Tickets <= 3.4.3 - Unauthenticated Stored Cross-Site Scripting Patched CVE-2024-1320 6.5 Lucio Sá March 8, 2024
EventPrime – Events Calendar, Bookings and Tickets <= 3.4.2 - Missing Authorization to Authenticated (Subscriber+) Attendee List Retrieval Patched CVE-2024-1126 4.3 Lucio Sá February 14, 2024
EventPrime – Events Calendar, Bookings and Tickets <= 3.4.1 - Missing Authorization to Authenticated (Subscriber+) Event Export Patched CVE-2024-1127 4.3 Lucio Sá February 14, 2024
EventPrime <= 3.3.9 - Improper Input Validation via save_event_booking Patched CVE-2024-24832 5.3 Abdi Pranata February 2, 2024
EventPrime <= 3.3.5 - Missing Authorization to Private Event Disclosure Patched CVE-2023-6447 5.3 Miguel Santareno December 29, 2023
EventPrime – Modern Events Calendar, Bookings and Tickets <= 3.3.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode Patched 6.4 November 21, 2023
EventPrime <= 3.3.2 - Improper Server-Side Checks to Booking Payment Bypass Patched CVE-2023-4252 5.3 Alex Sanford October 30, 2023
EventPrime <= 3.1.5 - Reflected Cross-Site Scripting via 'event_id' Patched CVE-2023-45637 6.1 Phd October 11, 2023
EventPrime < 3.2.0 - Reflected HTML Content Injection Patched CVE-2023-5238 4.3 Miguel Santareno October 9, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation