
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-47539 is a critical privilege escalation vulnerability affecting the Eventin WordPress plugin developed by Themewinter. The vulnerability was discovered by security researcher Denver Jackson and reported through the Patchstack Zero Day Initiative. Disclosed on May 7, 2025, this high-severity flaw affects versions up to 4.0.26 of the plugin, which has over 10,000 active installations. The vulnerability received a CVSS score of 9.8, indicating its critical nature (Patchstack, SecurityOnline).
The vulnerability exists in the /wp-json/eventin/v2/speakers/import REST API endpoint due to a flawed permission check implementation. The permissioncallback function, set to importitempermissionscheck(), always returns true, allowing any unauthenticated user to access the endpoint. The vulnerable code processes user-supplied CSV files through $importer->import($file) and $this->create_speaker() functions, enabling attackers to create users with administrator privileges (Patchstack).
The vulnerability allows unauthenticated attackers to gain full administrative access to affected WordPress sites. This level of access enables complete site compromise, including the ability to modify content, install malicious plugins, access sensitive data, and potentially affect the underlying server (SecurityOnline, NVD).
Site administrators are strongly advised to update the Eventin plugin to version 4.0.27 or later, which contains the security fix. Additional recommended security measures include auditing the user list for suspicious administrator accounts and implementing two-factor authentication for all administrative users. Patchstack customers are automatically protected through virtual patching (SecurityOnline, Patchstack).
The security community has responded quickly to this vulnerability, with Patchstack awarding the discovering researcher a $600 USD bounty through their Zero Day bug bounty program. The vulnerability has gained significant attention due to its critical nature and the large number of potentially affected websites (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”