CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-11726

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00026/1

CVE-2024-11726 is a SQL Injection vulnerability found in the BookingPress plugin for WordPress. This flaw allows attackers to inject malicious SQL code via the 'category' parameter in the 'bookingpress_form' shortcode. Present in versions up to 1.1.21, it's triggered due to inadequate input sanitization and SQL query preparation. Authenticated contributors can exploit this vulnerability to extract sensitive data from the database. Although the CVSS score is 0, the plugin being tagged as "In The Wild" means the vulnerability is actively being exploited. With an SVRS of 30, while not critical, this CVE still warrants investigation and patching to prevent potential data breaches. This highlights the importance of regular plugin updates and strong user permission management within WordPress.

In The Wild
2024-12-24

2024-12-24
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-11726 affects the Appointment Booking Calendar Plugin and Scheduling Plugin – BookingPress plugin for WordPress. This vulnerability allows authenticated attackers, with Contributor-level access or higher, to execute SQL Injection attacks via the 'category' parameter within the 'bookingpress_form' shortcode. The vulnerability stems from insufficient escaping of user-supplied parameters and inadequate preparation of the existing SQL query. This flaw enables attackers to append malicious SQL commands to existing queries, potentially extracting sensitive information from the database.

While the CVSS score is 6.5, the SOCRadar Vulnerability Risk Score (SVRS) is 46, indicating a moderate risk level. Although not immediately critical, this vulnerability necessitates attention and mitigation measures due to its potential impact.

Key Insights

  • Impact: This vulnerability allows attackers with Contributor-level access or higher to potentially steal sensitive data from the WordPress database, potentially including user credentials, financial information, and other confidential data.
  • Exploitation: The vulnerability is exploitable via the 'bookingpress_form' shortcode, which is commonly used in WordPress websites for booking appointments and scheduling events. Attackers can craft malicious input within the 'category' parameter to execute their SQL injection commands.
  • Attack Vector: Authenticated attackers with Contributor-level access or higher can exploit this vulnerability. This signifies that attackers need to gain initial access to the WordPress website before exploiting this specific vulnerability.
  • Affected Versions: All versions of the BookingPress plugin up to and including 1.1.21 are vulnerable. Users must update to a patched version to mitigate this risk.

Mitigation Strategies

  1. Update the Plugin: Immediately update the BookingPress plugin to the latest version. This is the most effective way to address the vulnerability.
  2. Apply Input Validation: Implement robust input validation and sanitization practices for all user inputs, particularly those used within the 'bookingpress_form' shortcode. This helps prevent malicious data from reaching the database.
  3. Limit User Privileges: Implement the principle of least privilege. Ensure that users only have access to the functionalities and data they require for their roles. This reduces the potential impact of an attack by limiting the attacker's access to sensitive information.
  4. Web Application Firewall (WAF): Consider implementing a WAF to protect your WordPress website from various attacks, including SQL injection. A WAF can detect and block malicious traffic, offering an additional layer of security.

Additional Information

If you have any further questions regarding this incident, please utilize the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-11726 | Appointment Booking Calendar Plugin and Scheduling Plugin sql injection
vuldb.com2024-12-24
CVE-2024-11726 | Appointment Booking Calendar Plugin and Scheduling Plugin sql injection | A vulnerability was found in Appointment Booking Calendar Plugin and Scheduling Plugin up to 1.1.21 on WordPress. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to sql injection. This vulnerability is handled as CVE-2024-11726. The attack may be launched remotely. There is no exploit available.
vuldb.com
rss
forum
news

Social Media

CVE-2024-11726 The Appointment Booking Calendar Plugin and Scheduling Plugin – BookingPress plugin for WordPress is vulnerable to SQL Injection via the 'category' parameter of the '… https://t.co/z5iW3tLq98
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/changeset/3206780/bookingpress-appointment-booking/trunk/core/classes/frontend/class.bookingpress_appointment_bookings.php
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/6d081b89-1b98-4f4f-8728-d1ea676d7afd?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence