The WP Hotel Booking plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the hotel_booking_load_order_user AJAX action in all versions up to, and including, 2.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve a list of registered user emails.
References
Configurations
History
24 Jan 2025, 20:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/wp-hotel-booking/trunk/assets/js/admin/admin.hotel-booking.js#L621 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3225879/ - Patch | |
References | () https://wordpress.org/plugins/wp-hotel-booking/#developers - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/bc883e7e-af82-47e1-a0c0-122e6abd6b52?source=cve - Third Party Advisory | |
First Time |
Thimpress
Thimpress wp Hotel Booking |
|
Summary |
|
22 Jan 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-22 11:15
Updated : 2025-01-24 20:53
NVD link : CVE-2024-13447
Mitre link : CVE-2024-13447
CVE.ORG link : CVE-2024-13447
JSON object : View
Products Affected
thimpress
- wp_hotel_booking
CWE
CWE-862
Missing Authorization