The WP Hotel Booking plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_review() function in all versions up to, and including, 2.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
11 Feb 2025, 21:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/wp-hotel-booking/trunk/includes/class-wphb-comments.php#L150 - Product | |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3157905%40wp-hotel-booking&new=3157905%40wp-hotel-booking&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/784593ec-b635-4f59-9afb-ab506f786d21?source=cve - Third Party Advisory | |
First Time |
Thimpress
Thimpress wp Hotel Booking |
|
CPE | cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:* |
04 Oct 2024, 13:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Oct 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-02 05:15
Updated : 2025-02-11 21:42
NVD link : CVE-2024-7855
Mitre link : CVE-2024-7855
CVE.ORG link : CVE-2024-7855
JSON object : View
Products Affected
thimpress
- wp_hotel_booking
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type