First published: Tue Nov 29 2022(Updated: )
The Appointment Hour Booking plugin for WordPress is vulnerable to CAPTCHA bypass in versions up to, and including, 1.3.72. This is due to the use of insufficiently strong hashing algorithm on the CAPTCHA secret that is also displayed to the user via a cookie.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dwbooster Appointment Hour Booking | <=1.3.72 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4036 is a vulnerability in the Appointment Hour Booking plugin for WordPress that allows for CAPTCHA bypass.
CVE-2022-4036 has a severity rating of 5.3 (medium).
Versions up to and including 1.3.72 of the Appointment Hour Booking plugin for WordPress are affected by CVE-2022-4036.
CVE-2022-4036 can be exploited by bypassing the CAPTCHA through the use of an insufficiently strong hashing algorithm on the CAPTCHA secret.
Yes, you can find references for CVE-2022-4036 at the following links: [Reference 1](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail=), [Reference 2](https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4036)