CVE-2024-3022

The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:free:wordpress:*:*

History

13 Mar 2025, 01:38

Type Values Removed Values Added
First Time Reputeinfosystems
Reputeinfosystems bookingpress
CWE CWE-434
CPE cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:free:wordpress:*:*
References () https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php - () https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php - Patch
References () https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4 - () https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4 - Exploit, Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve - Third Party Advisory

21 Nov 2024, 09:28

Type Values Removed Values Added
Summary
  • (es) El complemento BookingPress para WordPress es vulnerable a cargas de archivos arbitrarias debido a una validación insuficiente del nombre de archivo en la función 'bookingpress_process_upload' en todas las versiones hasta la 1.0.87 incluida. Esto permite que un atacante autenticado con capacidades de nivel de administrador o superior cargue archivos arbitrarios en el servidor del sitio afectado, lo que permite la ejecución remota de código.
References () https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php - () https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php -
References () https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4 - () https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4 -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve -

04 Apr 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-04 02:15

Updated : 2025-03-13 01:38


NVD link : CVE-2024-3022

Mitre link : CVE-2024-3022

CVE.ORG link : CVE-2024-3022


JSON object : View

Products Affected

reputeinfosystems

  • bookingpress
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type