Tickera – Sell Tickets & Manage Events Vulnerability (Medium) – CVE…

Tickera – Sell Tickets & Manage Events Vulnerability (Medium) – CVE…

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2025-12356 is a Medium-severity authorization issue affecting Tickera – Sell Tickets & Manage Events (slug: tickera-event-ticketing-system) in versions up to 3.5.6.4. It involves a WordPress AJAX function (wp_ajax_change_ticket_status) that can be called by an authenticated user without the proper permission check.

In practical terms, an attacker who can log in with even low privileges (Subscriber or above) may be able to change event or post statuses through that endpoint. This is especially relevant for organizations that allow account creation (e.g., customers, partners, staff, volunteers) or have many users with basic access.

Security Weakness

The root cause is a missing authorization (capability) check on the plugin’s AJAX endpoint used to change ticket status. Without that check, the system may accept status-update requests from users who should not be allowed to alter publishing or event state.

This is not described as a data-exposure issue. The published CVSS details indicate integrity impact (I:L) without confidentiality or availability impact (C: N, A: N), aligning with the risk of unauthorized content/workflow changes rather than a breach of sensitive records.

Technical or Business Impacts

Brand and revenue risk: If event or post statuses can be changed by unauthorized logged-in users, your organization may experience sudden event visibility changes (for example, content appearing “published” when it shouldn’t, or being moved out of public view). That can directly disrupt campaign timing, ticket sales momentum, and customer trust.

Operational disruption: Marketing and operations teams may spend time diagnosing “mysterious” event changes, delaying launches, promotions, or announcements. This can create friction across departments and reduce confidence in the web platform.

Governance and compliance risk: For teams with formal review/approval workflows, unauthorized status changes undermine internal controls. Even with a Medium severity rating (CVSS 4.3), the business impact can be significant when the website is a primary sales or communications channel.

Recommended action: Update Tickera – Sell Tickets & Manage Events to version 3.5.6.5 or newer, which includes a patch. Track this issue as CVE-2025-12356. The vulnerability is documented by Wordfence at this advisory.

Similar Attacks

Authorization gaps that let low-privilege users perform higher-privilege actions are a recurring theme in WordPress ecosystems. Here are a few real, public examples of broadly similar patterns (not necessarily the same plugin or endpoint):

CVE-2021-29447 (WordPress Core) — a media-related issue that could allow unexpected behavior under certain conditions, demonstrating how common web workflows can become security-critical.

CVE-2021-24762 (Plugin vulnerability example) — illustrates how plugin-level weaknesses can enable unauthorized actions and site integrity issues when permissions are not enforced correctly.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers