The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-31630 The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Mar 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Reputeinfosystems
Reputeinfosystems bookingpress
Weaknesses CWE-434
CPEs cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:free:wordpress:*:*
Vendors & Products Reputeinfosystems
Reputeinfosystems bookingpress

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T19:32:42.511Z

Reserved: 2024-03-27T18:18:50.249Z

Link: CVE-2024-3022

cve-icon Vulnrichment

Updated: 2024-08-01T19:32:42.511Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-04T02:15:07.230

Modified: 2025-03-13T01:38:18.387

Link: CVE-2024-3022

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.