The WP Hotel Booking plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_review() function in all versions up to, and including, 2.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Thimpress
Thimpress wp Hotel Booking |
|
CPEs | cpe:2.3:a:thimpress:wp_hotel_booking:-:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Thimpress
Thimpress wp Hotel Booking |
|
Metrics |
ssvc
|
Wed, 02 Oct 2024 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP Hotel Booking plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_review() function in all versions up to, and including, 2.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | |
Title | WP Hotel Booking <= 2.1.2 - Authenticated (Subscriber+) Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-02T04:31:17.744Z
Updated: 2024-10-02T13:43:57.551Z
Reserved: 2024-08-15T16:46:42.025Z
Link: CVE-2024-7855
Vulnrichment
Updated: 2024-10-02T13:43:52.342Z
NVD
Status : Awaiting Analysis
Published: 2024-10-02T05:15:11.843
Modified: 2024-10-04T13:50:43.727
Link: CVE-2024-7855
Redhat
No data.