The Appointment Hour Booking Plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.3.72. This makes it possible for unauthenticated attackers to embed untrusted input into content during booking creation that may be exported as a CSV file when a site's administrator exports booking details. This can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
References
Configurations
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.8 |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail= - Patch, Third Party Advisory | |
References | () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4034 - Third Party Advisory |
Information
Published : 2022-11-29 21:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4034
Mitre link : CVE-2022-4034
CVE.ORG link : CVE-2022-4034
JSON object : View
Products Affected
dwbooster
- appointment_hour_booking
CWE
CWE-1236
Improper Neutralization of Formula Elements in a CSV File