Eventin – Events Calendar, Event Booking, Ticket & Registration (AI…

Eventin – Events Calendar, Event Booking, Ticket & Registration (AI…

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2025-68047 is a High-severity vulnerability (CVSS 7.5) affecting Eventin – Events Calendar, Event Booking, Ticket & Registration (AI Powered) (WordPress plugin slug: wp-event-solution) in versions up to and including 4.1.3.

This issue is authenticated, meaning an attacker must be able to log in with at least Contributor-level access (or higher). In practical terms, risk increases for organizations that accept external contributors, run multi-author sites, or have large numbers of user accounts (including temporary staff, agencies, interns, or third-party partners).

Because the attack works over the network and does not require a victim to click anything, an attacker who gains (or already has) a qualifying account can attempt exploitation directly against the site’s normal operations.

Security Weakness

The plugin is vulnerable to PHP Object Injection due to deserialization of untrusted input in Eventin versions through 4.1.3. In business terms, the application is accepting a specially crafted value and rebuilding internal objects from it without sufficient safeguards.

According to the advisory, there is no known POP chain within the vulnerable software itself. However, this class of vulnerability can become much more dangerous if a usable chain exists via another plugin or theme installed on the same WordPress site.

Official CVE record: https://www.cve.org/CVERecord?id=CVE-2025-68047

Technical or Business Impacts

If an attacker can combine this vulnerability with a suitable POP chain from another installed component, potential outcomes may include arbitrary file deletion, sensitive data retrieval, or code execution. These scenarios can translate into high-impact business events such as site downtime during a campaign, tampering with event pages or ticketing flows, theft of business/operational data, and costly incident response and recovery.

For leadership and compliance teams, the key risk is that a “plugin-only” issue can become an environment-wide compromise depending on what else is installed. This is especially relevant on marketing sites that tend to accumulate multiple plugins over time (analytics, page builders, forms, and integrations).

Remediation: Update Eventin to version 4.1.4 or a newer patched version as recommended by the vendor/community guidance. Source: Wordfence vulnerability entry.

Similar Attacks

PHP object injection and unsafe deserialization flaws have a long history of being leveraged for serious outcomes when attackers can find usable gadget/chain conditions in the broader application environment. Examples include:

Joomla! Object Injection (CVE-2015-8562) — a widely cited case where object injection could lead to remote compromise under certain conditions.

WP GDPR Compliance plugin issue (CVE-2018-19207) — an example from the WordPress ecosystem where a plugin vulnerability created a path to significant unauthorized actions.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers