Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2023-3219 โ€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: EventON plugin fails to validate `event_id` in `eventon_ics_download`. <br>๐Ÿ’ฅ **Consequences**: Unauthenticated access to **any** post content (including unpublished/protected).

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: Insecure Direct Object Reference (IDOR). <br>๐Ÿ” **Flaw**: No verification if `event_id` is a valid Event object before serving data.

Q3Who is affected? (Versions/Components)

๐Ÿ“ฆ **Affected**: WordPress Plugin **EventON**. <br>๐Ÿ“… **Version**: **< 2.1.2**. <br>๐ŸŒ **Platform**: WordPress sites using this calendar plugin.

Q4What can hackers do? (Privileges/Data)

๐Ÿ•ต๏ธ **Hackers Can**: Access **any** Post content via ICS export. <br>๐Ÿ”“ **Data**: Includes **unpublished** or **protected** posts. <br>๐Ÿšซ **Privileges**: No login required (Unauthenticated).

Q5Is exploitation threshold high? (Auth/Config)

๐Ÿ“‰ **Threshold**: **LOW**. <br>๐Ÿ”‘ **Auth**: None needed. <br>โš™๏ธ **Config**: Just need the numeric ID of the post. Easy to enumerate.

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ”ฅ **Public Exp?**: **YES**. <br>๐Ÿ“œ **PoC**: Available via Nuclei templates & PacketStorm. <br>๐ŸŒ **Wild Exploitation**: High risk due to simplicity.

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Self-Check**: Scan for EventON version < 2.1.2. <br>๐Ÿงช **Test**: Try accessing `eventon_ics_download` with arbitrary post IDs. <br>๐Ÿ“ก **Tools**: Use Nuclei or WPScan.

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿ› ๏ธ **Fixed?**: **YES**. <br>๐Ÿ’Š **Patch**: Upgrade EventON to **version 2.1.2 or later**. <br>โœ… **Action**: Update immediately via WordPress dashboard.

Q9What if no patch? (Workaround)

๐Ÿšง **No Patch?**: Disable the `eventon_ics_download` AJAX action. <br>๐Ÿ”’ **Mitigation**: Restrict access to ICS export functionality. <br>๐Ÿ‘ฎ **Monitor**: Log unusual ICS download requests.

Q10Is it urgent? (Priority Suggestion)

โšก **Urgency**: **HIGH**. <br>๐Ÿšจ **Priority**: Critical data leak risk. <br>๐Ÿƒ **Action**: Patch **immediately**. Unpublished content is exposed!