REPORT / 01
Analysis Report · Folder Analysis cache/community-events_1.5.6 → cache/community-events_1.5.7 — CVE-2025-14029
Shared security patch analysis results
02 ·
Lifecycle actions
cancel · resume · skip · regenerate
03 ·
Share this analysis
copy link · embed report
03 ·
CVE Security Analysis & Writeups
ai-generated · per cve
Comprehensive security analysis generated by AI for each confirmed CVE match. Click on a CVE to view the detailed writeup including vulnerability background, technical details, patch analysis, and PoC guide.
CVE-2025-14029
NVD
AI-Generated Analysis
05 ·
Findings
filter · search · paginate
Showing 0 to 0 of 0 results
community-events.php
AI: 1 vulnerabilities
1 true positive
CVE-2025-14029
--- cache/community-events_1.5.6/community-events.php 2026-01-18 00:19:17.727658553 +0000+++ cache/community-events_1.5.7/community-events.php 2026-01-18 00:19:26.228186925 +0000@@ -2,7 +2,7 @@ /*Plugin Name: Community Events Plugin URI: https://ylefebvre.github.io/wordpress-plugins/community-events/ Description: A plugin used to manage events and display them in a widget-Version: 1.5.6+Version: 1.5.7 Author: Yannick Lefebvre Author URI: https://ylefebvre.github.io Copyright 2025 Yannick Lefebvre (email : [email protected])@@ -161,7 +161,7 @@ global $wpdb; $events = $_GET['eventlist']; - if ( !wp_verify_nonce( $_GET['event_approval_nonce'], 'event_approval_nonce' ) ) {+ if ( !current_user_can( 'manage_options' ) || !wp_verify_nonce( $_GET['event_approval_nonce'], 'event_approval_nonce' ) ) { exit; }
AI Analysis
I'll analyze this diff for security vulnerabilities following the specified format.
Vulnerability Existed: yes
TRUE POSITIVE
Improper Access Control - CWE-284 - community-events.php - Lines 164
Old Code:
```php
if ( !wp_verify_nonce( $_GET['event_approval_nonce'], 'event_approval_nonce' ) ) {
exit;
}
```
Fixed Code:
```php
if ( !current_user_can( 'manage_options' ) || !wp_verify_nonce( $_GET['event_approval_nonce'], 'event_approval_nonce' ) ) {
exit;
}
```
Explanation:
The original code only validated a nonce without checking user permissions. This is a critical access control vulnerability (CWE-284). Any authenticated WordPress user could forge or guess the nonce and approve events, even if they lacked administrative privileges. The fix adds a `current_user_can( 'manage_options' )` check, ensuring only users with administrator capability can approve events. This follows WordPress security best practices by requiring both capability check AND nonce validation before processing sensitive operations.
CVE Analysis Results:
CVE-2025-14029: Yes
View CVE Description
The Community Events plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_admin_event_approval() function in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to approve arbitrary events via the 'eventlist' parameter.
Showing 1 to 1 of 1 results