The BA Book Everything plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.20. This is due to missing or incorrect nonce validation on the my_account_update() function. This makes it possible for unauthenticated attackers to update a user's account details via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to reset a user's password and gain access to their account.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ba-booking
Ba-booking ba Book Everything |
|
CPEs | cpe:2.3:a:ba-booking:ba_book_everything:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Ba-booking
Ba-booking ba Book Everything |
Tue, 24 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Booking Algorithms
Booking Algorithms ba Book Everything |
|
CPEs | cpe:2.3:a:booking_algorithms:ba_book_everything:*:*:*:*:*:*:*:* | |
Vendors & Products |
Booking Algorithms
Booking Algorithms ba Book Everything |
|
Metrics |
ssvc
|
Tue, 24 Sep 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The BA Book Everything plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.20. This is due to missing or incorrect nonce validation on the my_account_update() function. This makes it possible for unauthenticated attackers to update a user's account details via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to reset a user's password and gain access to their account. | |
Title | BA Book Everything <= 1.6.20 - Cross-Site Request Forgery to Email Address Update/Account Takeover | |
Weaknesses | CWE-352 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-24T01:56:47.005Z
Updated: 2024-09-24T13:43:08.237Z
Reserved: 2024-09-13T16:45:13.302Z
Link: CVE-2024-8795
Vulnrichment
Updated: 2024-09-24T13:43:01.123Z
NVD
Status : Analyzed
Published: 2024-09-24T02:15:04.790
Modified: 2024-09-26T16:46:55.587
Link: CVE-2024-8795
Redhat
No data.