First published: Wed Aug 02 2023(Updated: )
The Bus Ticket Booking with Seat Reservation plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab_date' and 'tab_date_r' parameters in versions up to, and including, 5.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Magepeople Bus Ticket Booking With Seat Reservation | <=5.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-4067.
The severity of CVE-2023-4067 is medium (6.1).
The affected software is the Bus Ticket Booking with Seat Reservation plugin for WordPress.
The vulnerability is caused by insufficient input sanitization and output escaping in the 'tab_date' and 'tab_date_r' parameters.
It is recommended to update to version 5.2.4 or later of the Bus Ticket Booking with Seat Reservation plugin for WordPress to fix this vulnerability.