Impact
This vulnerability arises from improper control of the filename in an include/require statement within the Beds24 Online Booking WordPress plugin. It permits local file inclusion, allowing an attacker to read arbitrary files or potentially execute code located on the server. The flaw is present in all releases through version 2.0.28. The impact may include exposure of configuration files, credentials, or other sensitive data, and in some cases could lead to remote code execution if the attacker can influence the included path.
Affected Systems
The vulnerability affects the Beds24 Online Booking plugin from markkinchin for WordPress. Specifically, all releases from the initial available version up to and including 2.0.28 are impacted. No other vendor or product versions are listed.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity. The EPSS score is less than 1 percent, signifying a low exploitation probability as of the latest data. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through a crafted web request that manipulates the include parameter, although the exact preconditions are not detailed in the provided information.
OpenCVE Enrichment
EUVD