CVE-2024-12274

The Appointment Booking Calendar Plugin and Scheduling Plugin WordPress plugin before 1.1.23 export settings functionality exports data to a public folder, with an easily guessable file name, allowing unauthenticated attackers to access the exported files (if they exist).
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:codepeople:appointment_booking_calendar:*:*:*:*:*:wordpress:*:*

History

08 May 2025, 19:37

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/e3176c9a-63f3-4a28-a8a7-8abb2b4100ef/ - () https://wpscan.com/vulnerability/e3176c9a-63f3-4a28-a8a7-8abb2b4100ef/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:codepeople:appointment_booking_calendar:*:*:*:*:*:wordpress:*:*
First Time Codepeople
Codepeople appointment Booking Calendar
CWE NVD-CWE-noinfo

13 Jan 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) El complemento Appointment Booking Calendar Plugin and Scheduling Plugin de WordPress anterior a la versión 1.1.23 exporta datos a una carpeta pública, con un nombre de archivo fácilmente adivinable, lo que permite a atacantes no autenticados acceder a los archivos exportados (si existen).
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

13 Jan 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-13 06:15

Updated : 2025-05-08 19:37


NVD link : CVE-2024-12274

Mitre link : CVE-2024-12274

CVE.ORG link : CVE-2024-12274


JSON object : View

Products Affected

codepeople

  • appointment_booking_calendar