The BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin plugin for WordPress is vulnerable to Arbitrary File Read to Arbitrary File Creation in all versions up to, and including, 1.1.5 via the 'bookingpress_save_lite_wizard_settings_func' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary files that contain the content of files on the server, allowing the execution of any PHP code in those files or the exposure of sensitive information.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-47561 The BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin plugin for WordPress is vulnerable to Arbitrary File Read to Arbitrary File Creation in all versions up to, and including, 1.1.5 via the 'bookingpress_save_lite_wizard_settings_func' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary files that contain the content of files on the server, allowing the execution of any PHP code in those files or the exposure of sensitive information.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T21:41:03.419Z

Reserved: 2024-07-03T00:36:15.239Z

Link: CVE-2024-6467

cve-icon Vulnrichment

Updated: 2024-08-01T21:41:03.419Z

cve-icon NVD

Status : Modified

Published: 2024-07-17T07:15:03.493

Modified: 2024-11-21T09:49:42.217

Link: CVE-2024-6467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.