WordPress Plugin Vulnerabilities
Booked < 2.2.6 - Broken Authentication to Export Users Data in CSV
Description
The plugin allows users to Book Appointment by providing their PII such as Email, Name, Phone Number and Personal Message. The vulnerability allows anyone to Dump all records of users and their appointment details in CSV as an unauthenticated user.
The user also gets registered as a WP User after submitting appointment which introduces more vulnerabilities i.e. a subscriber can approve, delete or modify any appointment and inject Stored XSS.
Edit (WPScanTeam):
February 7th, 2020 - Report Received & Envato Contacted
February 7th, 2020 - Envato Investigating
February 29th, 2020 - v2.2.6 released, fixing the issues
Proof of Concept
Affects Plugins
References
Miscellaneous
Original Researcher
Noman Riffat
Submitter
Noman Riffat
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2020-02-29 (about 6 years ago)
Added
2020-03-02 (about 6 years ago)
Last Updated
2020-03-03 (about 6 years ago)