First published: Wed Jan 22 2025(Updated: )
The WP Hotel Booking plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the hotel_booking_load_order_user AJAX action in all versions up to, and including, 2.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve a list of registered user emails.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
ThimPress WP Hotel Booking | <2.1.7 | |
WP Hotel Booking | <=2.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13447 is rated as a high severity vulnerability due to the potential for unauthorized data access.
To fix CVE-2024-13447, update the WP Hotel Booking plugin to version 2.1.7 or later.
All users of the WP Hotel Booking plugin for WordPress versions up to and including 2.1.6 are affected by CVE-2024-13447.
CVE-2024-13447 is an authorization vulnerability that allows unauthorized access to sensitive data.
Yes, authenticated attackers with Subscriber-level access can exploit CVE-2024-13447 to access restricted data.