The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation on the 'bookingpress_process_upload' function in versions up to, and including, 1.0.76. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
01 Dec 2023, 20:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/tags/1.0.76/core/classes/class.bookingpress_fileupload_class.php#L140 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/710b8e4e-01de-4e99-8cf2-31abc2419b29?source=cve - Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/changeset/3001484/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/3001484/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_settings.php - Patch | |
CPE | cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-434 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
28 Nov 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-28 03:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-6219
Mitre link : CVE-2023-6219
CVE.ORG link : CVE-2023-6219
JSON object : View
Products Affected
reputeinfosystems
- bookingpress
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type