Events Manager plugin

Name: Events Manager
Type: XSS
Exploit version: 5.3.5
Release Date: 06-05-2013
Status: A new version of Events Manager has been released  •

Description:
1) Input passed via the "event_owner_name" POST parameter to index.php (when "action" is set to "event_save") is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site if malicious data is viewed. Successful exploitation of this vulnerability requires a page with the "event_form" short code to be accessible to unregistered users.

2) Input passed via the "dbem_phone" POST parameter to wp-admin/admin-ajax.php (when "action" is set to "booking_add") is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site if malicious data is viewed.

Successful exploitation of this vulnerability requires the "No-User Booking Mode" setting to be disabled (disabled by default), guest bookings to be enabled (enabled by default), and bookings for an event to be enabled (disabled by default).

3) Input passed via the "event_start_date", "event_end_date", and "event_rsvp_date" POST parameters to wp-admin/post.php (when "action" is set to "editpost" and "post_type" is set to "event") is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site if malicious data is viewed.



Plugin Information

  1. Downloaded: 965159 Times
  2. Current Version: 5.5.3.1
  3. Author: Profile
  4. Tested up to: 4.0
  5. Download Plugin

Security Information

  1. Secunia ID: 52475
  2. Credit: Vendor
  • Plugin statistics provided by WordPress.org. Updated within the last day or so.
  • ¹ Status info requires plugin author's to fill in versioning info on the wordpress.org repository