First published: Tue Dec 24 2024(Updated: )
The Booking Calendar WpDevArt plugin is vulnerable to time-based, blind SQL injection via the `id` parameter in the “wpdevart_booking_calendar” shortcode in versions up to, and including, 3.2.19 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. The vulnerability requires the “delete_prev_date” theme option being enabled. This makes it possible for authenticated attackers, with contributor-level access or above, to append additional SQL queries into already existing query that can be used to extract sensitive information such as passwords from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Booking Calendar | <=3.2.19 | |
Booking Calendar | <3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10856 is categorized as a high severity vulnerability due to its potential for time-based, blind SQL injection.
To fix CVE-2024-10856, update the WpDevArt Booking Calendar plugin to version 3.2.20 or later.
The potential impacts of CVE-2024-10856 include unauthorized database access and data manipulation through SQL injection.
CVE-2024-10856 affects WpDevArt Booking Calendar versions up to and including 3.2.19.
The vulnerability CVE-2024-10856 is caused by insufficient escaping on the user-supplied 'id' parameter in the 'wpdevart_booking_calendar' shortcode.