First published: Wed May 29 2024(Updated: )
The WordPress Tour & Travel Booking Plugin for WooCommerce – WpTravelly plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ttbm_new_place_save' function in all versions up to, and including, 1.7.1. This makes it possible for unauthenticated attackers to create and publish new place posts. This function is also vulnerable to CSRF.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Travel | <=1.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0434 is considered a medium-severity vulnerability due to unauthorized modification of data.
To fix CVE-2024-0434, update the WpTravelly plugin to version 1.7.2 or later.
CVE-2024-0434 affects all versions of the WpTravelly plugin up to and including version 1.7.1.
CVE-2024-0434 can be exploited to perform unauthorized modifications of data within the WordPress site.
As of now, there is no publicly known exploit specifically targeting CVE-2024-0434.