Event Booking Manager for WooCommerce Vulnerability (High) – CVE-20…

Event Booking Manager for WooCommerce Vulnerability (High) – CVE-20…

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2026-23549 is a High-severity issue (CVSS 8.1, vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) affecting WpEvently (Event Booking Manager for WooCommerce) (plugin slug: mage-eventpress) up to and including version 5.1.1.

The vulnerability can be exploited without authentication over the network by sending crafted input that triggers unsafe deserialization. While the attack complexity is rated high, the key business concern is that exploitation does not require a logged-in user, which can broaden exposure for public-facing websites running the affected plugin.

Security Weakness

WpEvently is vulnerable to PHP Object Injection due to deserialization of untrusted input in versions up to, and including, 5.1.1. In practical terms, this means an attacker may be able to feed the application a specially crafted payload that causes it to create PHP objects in an unsafe way.

According to the published advisory, no known “POP chain” is present in the vulnerable software. However, PHP object injection risk often depends on the broader WordPress environment: if a usable POP chain exists through another plugin or theme installed on the same site, impact can escalate significantly.

Remediation is straightforward: update WpEvently to version 5.1.2 or newer, which includes the patch.

Technical or Business Impacts

If a suitable POP chain is available via another installed plugin or theme, an unauthenticated attacker could potentially delete arbitrary files, retrieve sensitive data, or execute code. These outcomes can translate quickly into high-cost business events such as website defacement, service disruption, stolen customer/attendee data, or a broader compromise of your eCommerce environment.

For marketing, revenue, and operations teams, the most common business impacts include downtime during peak campaign periods, lost ticket/booking revenue, damage to brand trust, and incident-response costs (emergency developer time, forensic review, and potential customer notifications). For compliance teams, any exposure of personal data (attendee details, order data, or admin credentials) can trigger regulatory and contractual reporting obligations.

Action items to reduce risk quickly: patch to 5.1.2+, confirm unnecessary plugins/themes are removed (not just deactivated), and ensure you have current backups and monitoring in place to detect abnormal behavior early.

Similar Attacks

Unsafe deserialization and object injection are recurring patterns across web applications and plugins. One notable WordPress plugin example is CVE-2019-15866, which also involved a WordPress plugin vulnerability that could be leveraged for severe outcomes under the right conditions.

For the official record of this WpEvently issue, reference CVE-2026-23549 and the vendor/community advisory at Wordfence Threat Intel.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers