Impact
The WPBookit WordPress plugin contains a flaw in the image_upload_handle() function where file type validation is omitted. This design flaw allows unauthenticated attackers to upload any file to the server, which can be exploited for remote code execution. The vulnerability is classified as CWE-434, highlighting the absence of input validation for file uploads.
Affected Systems
The vulnerability affects the WPBookit plugin from IQONIC Design on WordPress sites running any version up to and including 1.0.4. These installations are free‑licensed and available through the WordPress plugin repository.
Risk and Exploitability
With a CVSS score of 9.8 and an EPSS of 22%, the risk of exploitation is substantial, yet the vulnerability is currently not listed in the CISA KEV catalog. The likely attack path involves sending a crafted HTTP request to the add_booking_type route, which the plugin processes without requiring authentication, allowing an attacker to upload malicious files that may be executed on the server.
OpenCVE Enrichment