First published: Tue Nov 28 2023(Updated: )
The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation on the 'bookingpress_process_upload' function in versions up to, and including, 1.0.76. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Reputeinfosystems Bookingpress | <=1.0.76 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6219 is a vulnerability in the BookingPress plugin for WordPress that allows authenticated attackers with administrator-level capabilities or above to upload arbitrary files due to insufficient file validation.
CVE-2023-6219 has a severity keyword of 'high' and a severity value of 7.2.
CVE-2023-6219 affects the BookingPress plugin for WordPress up to and including version 1.0.76 by allowing authenticated attackers with administrator-level capabilities or above to upload arbitrary files.
To fix CVE-2023-6219, update the BookingPress plugin to a version that includes a fix for the vulnerability, or apply a patch provided by the plugin vendor.
Yes, you can find additional information about CVE-2023-6219 at the following references: [1] [2] [3]