The Five Star Restaurant Reservations WordPress plugin before 2.4.12 does not have authorisation when changing whether a payment was successful or failed, allowing unauthenticated users to change the payment status of arbitrary bookings. Furthermore, due to the lack of sanitisation and escaping, attackers could perform Cross-Site Scripting attacks against a logged in admin viewing the failed payments
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/145e8d3c-cd6f-4827-86e5-ea2d395a80b9 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 03:41
Type | Values Removed | Values Added |
---|---|---|
CWE |
26 Jun 2023, 17:47
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-116 |
Information
Published : 2022-11-21 11:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-0421
Mitre link : CVE-2022-0421
CVE.ORG link : CVE-2022-0421
JSON object : View
Products Affected
fivestarplugins
- five_star_restaurant_reservations
CWE
CWE-116
Improper Encoding or Escaping of Output