WordPress Plugin Vulnerabilities

Booked < 2.2.6 - Broken Authentication to Export Users Data in CSV

Description

The plugin allows users to Book Appointment by providing their PII such as Email, Name, Phone Number and Personal Message. The vulnerability allows anyone to Dump all records of users and their appointment details in CSV as an unauthenticated user.

The user also gets registered as a WP User after submitting appointment which introduces more vulnerabilities i.e. a subscriber can approve, delete or modify any appointment and inject Stored XSS.

Edit (WPScanTeam):
February 7th, 2020 - Report Received & Envato Contacted
February 7th, 2020 - Envato Investigating
February 29th, 2020 - v2.2.6 released, fixing the issues

Proof of Concept

Affects Plugins

Fixed in 2.2.6

References

Miscellaneous

Original Researcher
Noman Riffat
Submitter
Noman Riffat
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2020-02-29 (about 6 years ago)
Added
2020-03-02 (about 6 years ago)
Last Updated
2020-03-03 (about 6 years ago)

Other