// For flags

CVE-2023-4252

EventPrime <= 3.2.9 - Booking Pricing Bypass

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The EventPrime WordPress plugin through 3.2.9 specifies the price of a booking in the client request, allowing an attacker to purchase bookings without payment.

El complemento EventPrime de WordPress hasta la versiĆ³n 3.2.9 especifica el precio de una reserva en la solicitud del cliente, lo que permite a un atacante comprar reservas sin pago.

The EventPrime plugin for WordPress is vulnerable to booking payment bypass in all versions up to, and including, 3.3.2. This is due to the plugin relying on user supplied input to control pricing instead of server-side controls/validation. This makes it possible for unauthenticated attackers to make bookings paying less than the expected amount for a booking.

*Credits: Alex Sanford, WPScan
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-08-08 CVE Reserved
  • 2023-10-30 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • 2024-10-27 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-1284: Improper Validation of Specified Quantity in Input
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Metagauss
Search vendor "Metagauss"
Eventprime
Search vendor "Metagauss" for product "Eventprime"
<= 3.2.9
Search vendor "Metagauss" for product "Eventprime" and version " <= 3.2.9"
wordpress
Affected