CVE-2025-47539
WordPress vulnerability analysis and mitigation

Overview

CVE-2025-47539 is a critical privilege escalation vulnerability affecting the Eventin WordPress plugin developed by Themewinter. The vulnerability was discovered by security researcher Denver Jackson and reported through the Patchstack Zero Day Initiative. Disclosed on May 7, 2025, this high-severity flaw affects versions up to 4.0.26 of the plugin, which has over 10,000 active installations. The vulnerability received a CVSS score of 9.8, indicating its critical nature (Patchstack, SecurityOnline).

Technical details

The vulnerability exists in the /wp-json/eventin/v2/speakers/import REST API endpoint due to a flawed permission check implementation. The permissioncallback function, set to importitempermissionscheck(), always returns true, allowing any unauthenticated user to access the endpoint. The vulnerable code processes user-supplied CSV files through $importer->import($file) and $this->create_speaker() functions, enabling attackers to create users with administrator privileges (Patchstack).

Impact

The vulnerability allows unauthenticated attackers to gain full administrative access to affected WordPress sites. This level of access enables complete site compromise, including the ability to modify content, install malicious plugins, access sensitive data, and potentially affect the underlying server (SecurityOnline, NVD).

Mitigation and workarounds

Site administrators are strongly advised to update the Eventin plugin to version 4.0.27 or later, which contains the security fix. Additional recommended security measures include auditing the user list for suspicious administrator accounts and implementing two-factor authentication for all administrative users. Patchstack customers are automatically protected through virtual patching (SecurityOnline, Patchstack).

Community reactions

The security community has responded quickly to this vulnerability, with Patchstack awarding the discovering researcher a $600 USD bounty through their Zero Day bug bounty program. The vulnerability has gained significant attention due to its critical nature and the large number of potentially affected websites (Patchstack).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management