CVE-2024-3022

The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:free:wordpress:*:*

History

13 Mar 2025, 01:38

Type Values Removed Values Added
First Time Reputeinfosystems bookingpress
Reputeinfosystems
CWE CWE-434
CPE cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:free:wordpress:*:*
References () https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php - () https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php - Patch
References () https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4 - () https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4 - Exploit, Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve - Third Party Advisory

Information

Published : 2024-04-04 02:15

Updated : 2025-03-13 01:38


NVD link : CVE-2024-3022

Mitre link : CVE-2024-3022

CVE.ORG link : CVE-2024-3022


JSON object : View

Products Affected

reputeinfosystems

  • bookingpress
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type