CVE-2022-4034

The Appointment Hour Booking Plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.3.72. This makes it possible for unauthenticated attackers to embed untrusted input into content during booking creation that may be exported as a CSV file when a site's administrator exports booking details. This can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dwbooster:appointment_hour_booking:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 5.8
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail= - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail= - Patch, Third Party Advisory
References () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4034 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4034 - Third Party Advisory

Information

Published : 2022-11-29 21:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-4034

Mitre link : CVE-2022-4034

CVE.ORG link : CVE-2022-4034


JSON object : View

Products Affected

dwbooster

  • appointment_hour_booking
CWE
CWE-1236

Improper Neutralization of Formula Elements in a CSV File