Arbitrary File Upload leading to RCE in E4J s.r.l. VikBooking Hotel Booking Engine & PMS plugin <= 1.5.3 on WordPress allows attackers to upload and execute dangerous file types (e.g. PHP shell) via the signature upload on the booking form.
References
Link | Resource |
---|---|
https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-hotel-booking-engine-pms-plugin-1-5-3-arbitrary-file-upload-leading-to-rce | Release Notes Third Party Advisory |
https://wordpress.org/plugins/vikbooking/#developers | Release Notes Vendor Advisory |
https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-hotel-booking-engine-pms-plugin-1-5-3-arbitrary-file-upload-leading-to-rce | Release Notes Third Party Advisory |
https://wordpress.org/plugins/vikbooking/#developers | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-hotel-booking-engine-pms-plugin-1-5-3-arbitrary-file-upload-leading-to-rce - Release Notes, Third Party Advisory | |
References | () https://wordpress.org/plugins/vikbooking/#developers - Release Notes, Vendor Advisory |
Information
Published : 2022-04-19 21:15
Updated : 2024-11-21 06:56
NVD link : CVE-2022-27862
Mitre link : CVE-2022-27862
CVE.ORG link : CVE-2022-27862
JSON object : View
Products Affected
vikwp
- vikbooking_hotel_booking_engine_\&_property_management_system_plugin
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type