First published: Sat Nov 23 2024(Updated: )
The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpte_onboard_save_function_callback() function in all versions up to, and including, 6.2.1. This makes it possible for authenticated attackers, with contributor-level access and above, to modify several settings that could have an impact such as lost revenue and page updates.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Travel Engine | <=6.2.1 | |
WP Travel Travel Engine | <6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-10606 is considered high due to the potential for unauthorized data modification.
To fix CVE-2024-10606, update the WP Travel Engine plugin to version 6.2.2 or later.
All versions of the WP Travel Engine plugin up to and including 6.2.1 are affected by CVE-2024-10606.
CVE-2024-10606 is an unauthorized modification of data vulnerability due to a missing capability check.
Users of the WP Travel Engine plugin for WordPress are impacted by CVE-2024-10606 if they are using affected versions.