CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
28.0%
The Appointment Booking Calendar Plugin and Online Scheduling Plugin – BookingPress plugin for WordPress is vulnerable to authentication bypass in versions 1.1.6 to 1.1.7. This is due to the plugin not properly verifying a user’s identity prior to logging them in when completing a booking. This makes it possible for unauthenticated attackers to log in as registered users, including administrators, if they have access to that user’s email. This is only exploitable when the ‘Auto login user after successful booking’ setting is enabled.
Vendor | Product | Version | CPE |
---|---|---|---|
reputeinfosystems | bookingpress | * | cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:* |
[
{
"vendor": "reputeinfosystems",
"product": "Appointment Booking Calendar Plugin and Scheduling Plugin – BookingPress",
"versions": [
{
"version": "1.1.6",
"status": "affected",
"lessThanOrEqual": "1.1.7",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_customers.php#L339
plugins.trac.wordpress.org/changeset/3130266/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_customers.php
www.wordfence.com/threat-intel/vulnerabilities/id/4c367565-75f7-4dd7-a2f1-111df581bd7a?source=cve