First published: Wed Jun 19 2024(Updated: )
The Salon booking system plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the SLN_Action_Ajax_ImportAssistants function along with missing authorization checks in all versions up to, and including, 10.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Salon Booking System | <=10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3229 is rated as a high-severity vulnerability due to its potential for arbitrary file uploads.
To fix CVE-2024-3229, update the Salon Booking System plugin to the latest version above 10.2.
All users of the Salon Booking System plugin for WordPress running version 10.2 or lower are affected by CVE-2024-3229.
An attacker can exploit CVE-2024-3229 to upload arbitrary files, potentially leading to unauthorized access or remote code execution.
Yes, there is a patch available that can be applied by updating the Salon Booking System plugin to the fixed version.