CVE-2024-5071

The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:*

History

19 May 2025, 21:02

Type Values Removed Values Added
First Time Wpbookster bookster
Wpbookster
CPE cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:*
References () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - Exploit, Third Party Advisory

21 Nov 2024, 09:46

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ -

28 Oct 2024, 21:35

Type Values Removed Values Added
Summary
  • (es) El complemento Bookster WordPress hasta la versión 1.1.0 permite agregar parámetros confidenciales al validar citas, lo que permite a los atacantes manipular los datos enviados al reservar una cita (el cuerpo de la solicitud) para cambiar su estado de pendiente a aprobado.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-863

26 Jun 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-26 06:15

Updated : 2025-05-19 21:02


NVD link : CVE-2024-5071

Mitre link : CVE-2024-5071

CVE.ORG link : CVE-2024-5071


JSON object : View

Products Affected

wpbookster

  • bookster
CWE
CWE-863

Incorrect Authorization