First published: Mon Jan 13 2025(Updated: )
The Appointment Booking Calendar Plugin and Scheduling Plugin WordPress plugin before 1.1.23 export settings functionality exports data to a public folder, with an easily guessable file name, allowing unauthenticated attackers to access the exported files (if they exist).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
CodePeople Appointment Hour Booking | <1.1.23 | |
BookingPress | <1.1.23 | |
Appointment Booking Calendar | <1.1.23 | |
Scheduling Plugin | <1.1.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12274 has been classified as a high-severity vulnerability due to its potential for exposing sensitive data.
To fix CVE-2024-12274, update the Appointment Booking Calendar Plugin and Scheduling Plugin to version 1.1.23 or later.
CVE-2024-12274 affects users of the Appointment Booking Calendar Plugin, Scheduling Plugin, and BookingPress BookingPress versions prior to 1.1.23.
CVE-2024-12274 enables unauthenticated attackers to access exported data files stored in a public folder.
The vulnerability in CVE-2024-12274 arises from the export settings functionality that exposes data through an easily guessable file name.