The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ | Exploit Third Party Advisory |
Configurations
History
19 May 2025, 21:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:* | |
First Time |
Wpbookster bookster
Wpbookster |
26 Jun 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-26 06:15
Updated : 2025-05-19 21:02
NVD link : CVE-2024-5071
Mitre link : CVE-2024-5071
JSON object : View
Products Affected
wpbookster
- bookster
CWE
No CWE.