The BA Book Everything plugin for WordPress is vulnerable to arbitrary password reset in all versions up to, and including, 1.6.20. This is due to the reset_user_password() function not verifying a user's identity prior to setting a password. This makes it possible for unauthenticated attackers to reset any user's passwords, including administrators. It's important to note that the attacker will not have access to the generated password, therefore, privilege escalation is not possible.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ba-booking
Ba-booking ba Book Everything |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:ba-booking:ba_book_everything:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Ba-booking
Ba-booking ba Book Everything |
Tue, 24 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Booking Algorithms
Booking Algorithms ba Book Everything |
|
CPEs | cpe:2.3:a:booking_algorithms:ba_book_everything:*:*:*:*:*:*:*:* | |
Vendors & Products |
Booking Algorithms
Booking Algorithms ba Book Everything |
|
Metrics |
ssvc
|
Tue, 24 Sep 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The BA Book Everything plugin for WordPress is vulnerable to arbitrary password reset in all versions up to, and including, 1.6.20. This is due to the reset_user_password() function not verifying a user's identity prior to setting a password. This makes it possible for unauthenticated attackers to reset any user's passwords, including administrators. It's important to note that the attacker will not have access to the generated password, therefore, privilege escalation is not possible. | |
Title | BA Book Everything <= 1.6.20 - Unauthenticated Arbitrary User Password Reset | |
Weaknesses | CWE-620 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-24T02:31:01.384Z
Updated: 2024-09-24T13:44:01.625Z
Reserved: 2024-09-13T16:38:26.128Z
Link: CVE-2024-8794
Vulnrichment
Updated: 2024-09-24T13:43:56.144Z
NVD
Status : Analyzed
Published: 2024-09-24T03:15:03.783
Modified: 2024-09-26T16:23:46.740
Link: CVE-2024-8794
Redhat
No data.