CVE-2024-5071

The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:*

History

19 May 2025, 21:02

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - () https://wpscan.com/vulnerability/07b293cf-5174-45de-8606-a782a96a35b3/ - Exploit, Third Party Advisory
First Time Wpbookster bookster
Wpbookster
CPE cpe:2.3:a:wpbookster:bookster:*:*:*:*:*:wordpress:*:*

Information

Published : 2024-06-26 06:15

Updated : 2025-05-19 21:02


NVD link : CVE-2024-5071

Mitre link : CVE-2024-5071

CVE.ORG link : CVE-2024-5071


JSON object : View

Products Affected

wpbookster

  • bookster
CWE
CWE-863

Incorrect Authorization