First published: Fri Jun 30 2023(Updated: )
The BookIt plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.3.7. This is due to insufficient verification on the user being supplied during booking an appointment through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Stylemixthemes Bookit | <=2.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-2834.
The severity level of CVE-2023-2834 is critical.
Versions up to and including 2.3.7 of the BookIt plugin for WordPress are affected by CVE-2023-2834.
The authentication bypass vulnerability in the BookIt plugin for WordPress occurs due to insufficient verification on the user being supplied during booking an appointment through the plugin.
If they exploit CVE-2023-2834, unauthenticated attackers can log in as any user.