The Appointment Hour Booking Plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.3.72. This makes it possible for unauthenticated attackers to embed untrusted input into content during booking creation that may be exported as a CSV file when a site's administrator exports booking details. This can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-51413 The Appointment Hour Booking Plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.3.72. This makes it possible for unauthenticated attackers to embed untrusted input into content during booking creation that may be exported as a CSV file when a site's administrator exports booking details. This can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 23 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-01-23T21:20:45.510Z

Reserved: 2022-11-16T18:36:46.474Z

Link: CVE-2022-4034

cve-icon Vulnrichment

Updated: 2024-08-03T01:27:54.082Z

cve-icon NVD

Status : Modified

Published: 2022-11-29T21:15:12.263

Modified: 2024-11-21T07:34:29.170

Link: CVE-2022-4034

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.