First published: Thu Apr 04 2024(Updated: )
The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Repute Infosystems BookingPress | <=1.0.87 | |
BookingPress | <=1.0.87 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3022 is considered a high severity vulnerability due to its impact on file upload functionality allowing unauthorized file uploads.
To fix CVE-2024-3022, update the BookingPress plugin to a version higher than 1.0.87 where the vulnerability is addressed.
CVE-2024-3022 affects users of the BookingPress plugin for WordPress with versions up to and including 1.0.87.
CVE-2024-3022 facilitates arbitrary file upload attacks by authenticated users with administrative privileges.
The vulnerability in CVE-2024-3022 is due to insufficient filename validation in the bookingpress_process_upload function, allowing potential exploitation.