The Free Booking Plugin for Hotels, Restaurant and Car Rental WordPress plugin before 1.1.16 suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04 - Exploit, Third Party Advisory |
Information
Published : 2022-07-11 13:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1952
Mitre link : CVE-2022-1952
CVE.ORG link : CVE-2022-1952
JSON object : View
Products Affected
syntactics
- free_booking_plugin_for_hotels\,_restaurant_and_car_rental
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type