Description
WordPress Plugin Quick Event Manager is prone to multiple vulnerabilities, including cross-site scripting, security bypass or cross-site request forgery vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, to perform otherwise restricted actions and subsequently change registration settings, or to perform certain administrative actions and gain unauthorized access to the affected application. WordPress Plugin Quick Event Manager version 9.7.4 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 9.7.5 or latest
References
https://www.tenable.com/security/research/tra-2023-3
https://sploitus.com/exploit?id=WPEX-ID:49178A9D-0500-4E3E-8EA1-6CD4EEDA2A4E
https://plugins.trac.wordpress.org/browser/quick-event-manager/trunk/changelog.txt
Related Vulnerabilities
WordPress Plugin Simple Download Monitor Cross-Site Scripting (3.5.3)
WordPress Plugin WP Job Manager Privilege Escalation (1.34.3)
SugarCRM Improper Input Validation Vulnerability (CVE-2012-0694)
WordPress Plugin Limit Login Attempts Reloaded Security Bypass (2.7.4)
Internet Information Services CVE-2006-6578 Vulnerability (CVE-2006-6578)