Vulnerability in WP Timetics Plugin Allows for Account Takeover and Privilege Escalation
CVE-2024-9263

9.8CRITICAL

Key Information:

Summary

The WP Timetics Appointment Booking Calendar and Online Scheduling Plugin for WordPress has a vulnerability that allows unauthenticated attackers to execute account takeover and privilege escalation through Insecure Direct Object Reference. This issue arises from insufficient validation on a user-controlled key during the save() function, affecting all versions up to and including 1.0.25. Consequently, attackers are able to reset the email addresses and passwords of arbitrary user accounts, giving them unauthorized access to sensitive accounts, including those of administrators.

Affected Version(s)

WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin * <= 1.0.25

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

wesley
.