First published: Tue Jun 18 2024(Updated: )
The Scheduling Plugin – Online Booking for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'cbsb_disconnect_settings' function in all versions up to, and including, 3.5.10. This makes it possible for unauthenticated attackers to disconnect the plugin from the startbooking service and remove connection data.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Startbooking Scheduling Plugin | <=3.5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1634 has been classified as a moderate severity vulnerability due to the risk of unauthorized data loss.
To fix CVE-2024-1634, update the Scheduling Plugin – Online Booking for WordPress to the latest version.
CVE-2024-1634 affects all versions of the Scheduling Plugin – Online Booking for WordPress up to and including version 3.5.10.
CVE-2024-1634 is a vulnerability related to unauthorized data access due to a missing capability check.
Any user of the Scheduling Plugin – Online Booking for WordPress versions up to 3.5.10 is potentially impacted by CVE-2024-1634.