The Appointment Hour Booking Plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.3.72. This makes it possible for unauthenticated attackers to embed untrusted input into content during booking creation that may be exported as a CSV file when a site's administrator exports booking details. This can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
References
Link | Resource |
---|---|
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4034 | Third Party Advisory |
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail= | Patch Third Party Advisory |
Configurations
Information
Published : 2022-11-29 13:15
Updated : 2022-12-01 14:04
NVD link : CVE-2022-4034
Mitre link : CVE-2022-4034
JSON object : View
CWE
CWE-1236
Improper Neutralization of Formula Elements in a CSV File
Products Affected
dwbooster
- appointment_hour_booking