The GetBookingsWP – Appointments Booking Calendar Plugin For WordPress plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.27. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
History

Fri, 21 Feb 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Istmoplugins
Istmoplugins get Bookings Wp
CPEs cpe:2.3:a:istmoplugins:get_bookings_wp:*:*:*:*:*:wordpress:*:*
Vendors & Products Istmoplugins
Istmoplugins get Bookings Wp

Tue, 18 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 04:30:00 +0000

Type Values Removed Values Added
Description The GetBookingsWP – Appointments Booking Calendar Plugin For WordPress plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.27. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
Title GetBookingsWp - Appointments & Bookings Plugin Basic Version <= 1.1.27 - Authenticated (Subscriber+) Privilege Escalation via Account Takeover
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-18T15:35:07.771Z

Reserved: 2025-01-23T18:27:19.268Z

Link: CVE-2024-13677

cve-icon Vulnrichment

Updated: 2025-02-18T15:35:03.215Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-18T05:15:17.893

Modified: 2025-02-21T16:03:44.037

Link: CVE-2024-13677

cve-icon Redhat

No data.