Description
The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31630 | The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution. |
References
History
Thu, 13 Mar 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Reputeinfosystems
Reputeinfosystems bookingpress |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:free:wordpress:*:* | |
| Vendors & Products |
Reputeinfosystems
Reputeinfosystems bookingpress |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T19:32:42.511Z
Reserved: 2024-03-27T18:18:50.249Z
Link: CVE-2024-3022
Updated: 2024-08-01T19:32:42.511Z
Status : Analyzed
Published: 2024-04-04T02:15:07.230
Modified: 2025-03-13T01:38:18.387
Link: CVE-2024-3022
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD