CVE-2025-69358

| EUVD-2025-209001 HIGH
2026-03-25 Patchstack GHSA-678w-hwfh-39xv
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 25, 2026 - 16:47 vuln.today
EUVD ID Assigned
Mar 25, 2026 - 16:47 euvd
EUVD-2025-209001
CVE Published
Mar 25, 2026 - 16:14 nvd
HIGH 7.5

Description

Missing Authorization vulnerability in Metagauss EventPrime eventprime-event-calendar-management allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through <= 4.2.6.0.

Analysis

A missing authorization vulnerability exists in the Metagauss EventPrime event calendar management plugin for WordPress, classified as CWE-862 (Missing Authorization), that allows attackers to bypass access control restrictions and perform unauthorized actions. The vulnerability affects EventPrime versions up to and including 4.2.6.0, enabling exploitation through incorrectly configured access control security levels. While no CVSS score or EPSS data is currently published, the vulnerability has been documented by Patchstack and assigned ENISA EUVD ID EUVD-2025-209001, suggesting active security community awareness, though KEV status and proof-of-concept availability remain unconfirmed from available intelligence.

Technical Context

EventPrime (cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:*:*:*) is a WordPress plugin providing event calendar management functionality. The root cause is classified under CWE-862 (Missing Authorization), indicating that the application fails to enforce proper access control checks before allowing users to perform sensitive operations. This typically manifests as insufficient server-side validation of user permissions, where client-side restrictions or role-based access control (RBAC) logic is either absent, misconfigured, or bypassable. WordPress plugins are particularly susceptible to authorization flaws when they directly expose admin or privileged functionality without verifying the current user's capabilities via WordPress' native permission model (e.g., wp_current_user_can() checks). The incorrect configuration of security levels suggests the vulnerability may stem from default-permissive settings or logical errors in capability checks across multiple plugin endpoints.

Affected Products

Metagauss EventPrime (the WordPress event calendar management plugin) in all versions from initial release through version 4.2.6.0 is affected, as confirmed by CPE cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:*:*:*. The ENISA EUVD database lists affected versions as 'EventPrime n/a ≤ 4.2.6.0'. The vulnerability was reported and documented by Patchstack in their WordPress plugin vulnerability database. Reference the detailed advisory at https://patchstack.com/database/Wordpress/Plugin/eventprime-event-calendar-management/vulnerability/wordpress-eventprime-plugin-4-2-6-0-broken-access-control-vulnerability for the most current patch status and version recommendations.

Remediation

Immediately upgrade EventPrime to a version released after 4.2.6.0 (patch version to be confirmed from vendor) by navigating to WordPress Plugins > Installed Plugins, selecting EventPrime, and clicking 'Update Now', or download the patched version directly from the plugin repository or vendor website. Verify the update in the Plugins menu to confirm the new version is active. Until a patch is applied, implement WordPress-level access controls by restricting plugin administrative pages to specific user roles via security plugins (e.g., Wordfence, Sucuri), disable the plugin if not actively in use, and audit event calendar endpoints for unexpected access. Monitor Patchstack and the official EventPrime changelog (https://patchstack.com/database/Wordpress/Plugin/eventprime-event-calendar-management) for patch release notifications and apply updates within 24-48 hours of availability.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

CVE-2025-69358 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy