The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ | Exploit Third Party Advisory |
Configurations
History
19 May 2025, 21:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wpbookster bookster
Wpbookster |
|
CPE | cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - Exploit, Third Party Advisory |
21 Nov 2024, 09:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - |
28 Oct 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-863 |
26 Jun 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-26 06:15
Updated : 2025-05-19 21:02
NVD link : CVE-2024-5071
Mitre link : CVE-2024-5071
CVE.ORG link : CVE-2024-5071
JSON object : View
Products Affected
wpbookster
- bookster
CWE
CWE-863
Incorrect Authorization