Lucene search

K
wpvulndbWpvulndbWPVDB-ID:A32C98FF-17CF-4FAC-8968-3A7FA34885AF
HistoryApr 03, 2024 - 12:00 a.m.

BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin < 1.0.88 - Authenticated (Admin+) Arbitrary File Upload

2024-04-0300:00:00
wpscan.com
7
wordpress
bookingpress
arbitrary file uploads
security vulnerability
remote code execution

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0

Percentile

15.5%

Description The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the ‘bookingpress_process_upload’ function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site’s server, enabling remote code execution.

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0

Percentile

15.5%

Related for WPVDB-ID:A32C98FF-17CF-4FAC-8968-3A7FA34885AF