CVE-2024-5071

The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:*

History

19 May 2025, 21:02

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:*
First Time Wpbookster bookster
Wpbookster

26 Jun 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-26 06:15

Updated : 2025-05-19 21:02


NVD link : CVE-2024-5071

Mitre link : CVE-2024-5071


JSON object : View

Products Affected

wpbookster

  • bookster
CWE

No CWE.