The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ | Exploit Third Party Advisory |
Configurations
History
19 May 2025, 21:02
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wpbookster bookster
Wpbookster |
|
| References | () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:* |
26 Jun 2024, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-26 06:15
Updated : 2025-05-19 21:02
NVD link : CVE-2024-5071
Mitre link : CVE-2024-5071
JSON object : View
Products Affected
wpbookster
- bookster
CWE
No CWE.
