First published: Fri Oct 04 2024(Updated: )
The WP Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 10.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. In addition, site administrators have the option to grant lower-level users with access to manage the plugin's settings which may extend this vulnerability to those users.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Booking Calendar | <10.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9306 is classified as a high severity vulnerability due to its potential impact on WordPress sites.
To fix CVE-2024-9306, update the WP Booking Calendar plugin to version 10.6.1 or later.
CVE-2024-9306 affects users of the WP Booking Calendar plugin in all WordPress versions up to and including 10.6.
CVE-2024-9306 allows authenticated attackers to perform stored cross-site scripting (XSS) attacks via admin settings.
No, CVE-2024-9306 requires authentication as an administrator to exploit the stored XSS vulnerability.