First published: Sat Jun 03 2023(Updated: )
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized medication of data via the /wp-json/vcita-wordpress/v1/actions/auth REST-API endpoint in versions up to, and including, 4.2.10 due to a missing capability check on the processAction function. This makes it possible for unauthenticated attackers modify the plugin's settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vcita Online Booking & Scheduling Calendar | <=4.2.10 |
https://plugins.trac.wordpress.org/browser/meeting-scheduler-by-vcita/trunk/vcita-api-functions.php
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2299 is a vulnerability in the Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress.
CVE-2023-2299 allows unauthorized manipulation of data through the /wp-json/vcita-wordpress/v1/actions/auth REST-API endpoint in versions up to, and including, 4.2.10.
The severity of CVE-2023-2299 is medium, with a CVSS score of 5.3.
To fix CVE-2023-2299, it is recommended to update the Online Booking & Scheduling Calendar for WordPress by vcita plugin to a version higher than 4.2.10.
For more information about CVE-2023-2299, you can refer to the following sources: [link1], [link2], [link3].