CVE-2024-12274

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to access exported data files from the Appointment Booking Calendar Plugin for WordPress. The plugin exports settings to a public folder with predictable filenames, exposing potentially sensitive configuration data. Any WordPress site using vulnerable versions of this plugin is affected.

💻 Affected Systems

Products:
  • Appointment Booking Calendar Plugin and Scheduling Plugin for WordPress
Versions: All versions before 1.1.23
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable plugin version are affected by default; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive plugin configuration data, database credentials, or other exported information that could lead to further compromise of the WordPress site.

🟠

Likely Case

Unauthenticated users can download exported configuration files containing plugin settings, which may include API keys, email addresses, or other operational data.

🟢

If Mitigated

With proper access controls and file permissions, the impact is limited to potential information disclosure of non-sensitive plugin settings.

🌐 Internet-Facing: HIGH - The vulnerability affects internet-facing WordPress sites and requires no authentication to exploit.
🏢 Internal Only: LOW - This primarily affects public-facing WordPress installations; internal-only systems would still be vulnerable to internal attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires guessing predictable filenames in the public export directory; no authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.23

Vendor Advisory: https://wpscan.com/vulnerability/e3176c9a-63f3-4a28-a8a7-8abb2b4100ef/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Appointment Booking Calendar Plugin and Scheduling Plugin'. 4. Click 'Update Now' if available, or download version 1.1.23+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Remove public export files

Linux/Unix

Manually delete any exported files from the public plugin directory to prevent access

rm -rf /wp-content/plugins/appointment-booking-calendar/export/*

Restrict directory access

Apache

Add .htaccess rules to block access to the export directory

Add 'Deny from all' to /wp-content/plugins/appointment-booking-calendar/export/.htaccess

🧯 If You Can't Patch

  • Disable the plugin entirely until patching is possible
  • Implement web application firewall rules to block access to predictable export file patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'Appointment Booking Calendar Plugin and Scheduling Plugin' version number

Check Version:

wp plugin list --name='appointment-booking-calendar' --field=version

Verify Fix Applied:

Confirm plugin version is 1.1.23 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to requests for /wp-content/plugins/appointment-booking-calendar/export/* files
  • Multiple failed attempts to access predictable export filenames

Network Indicators:

  • Unusual GET requests to plugin export directory from unauthenticated users
  • Traffic patterns showing sequential filename guessing

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/appointment-booking-calendar/export/*" OR user_agent CONTAINS "scanner")

🔗 References

📤 Share & Export