🔐 CVE Alert

CVE-2024-6467

HIGH 8.8

BookingPress Appointment Booking <= 1.1.5 - Authenticated (Subscriber+) Arbitrary File Read to Arbitrary File Creation

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

The BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin plugin for WordPress is vulnerable to Arbitrary File Read to Arbitrary File Creation in all versions up to, and including, 1.1.5 via the 'bookingpress_save_lite_wizard_settings_func' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary files that contain the content of files (either on the local server or from a remote location), allowing the execution of any PHP code in those files or the exposure of sensitive information.

CWE CWE-73
Vendor reputeinfosystems
Product appointment booking calendar plugin and scheduling plugin – bookingpress
Published Jul 17, 2024
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for reputeinfosystems appointment booking calendar plugin and scheduling plugin – bookingpress

Be the first to know when new high vulnerabilities affecting reputeinfosystems appointment booking calendar plugin and scheduling plugin – bookingpress are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

reputeinfosystems / Appointment Booking Calendar Plugin and Scheduling Plugin – BookingPress
0 ≤ 1.1.5

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/d0177510-cd7d-4cc5-96c3-78433aa0e3f6?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress.php

Credits

Arkadiusz Hydzik