First published: Mon Mar 21 2022(Updated: )
The BookingPress WordPress plugin before 1.0.11 fails to properly sanitize user supplied POST data before it is used in a dynamically constructed SQL query via the bookingpress_front_get_category_services AJAX action (available to unauthenticated users), leading to an unauthenticated SQL Injection
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Reputeinfosystems Bookingpress | <1.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-0739 is classified as critical with a severity value of 9.8.
CVE-2022-0739 affects the BookingPress WordPress plugin before version 1.0.11.
The vulnerability type of CVE-2022-0739 is unauthenticated SQL Injection.
To fix CVE-2022-0739, update the BookingPress WordPress plugin to version 1.0.11 or later.
More information about CVE-2022-0739 can be found at the following references: [link 1](https://plugins.trac.wordpress.org/changeset/2684789), [link 2](https://wpscan.com/vulnerability/388cd42d-b61a-42a4-8604-99b812db2357).