CVE-2024-3229

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files to WordPress sites using the Salon booking system plugin. It affects all versions up to 10.2 due to missing file type validation and authorization checks, potentially leading to remote code execution.

💻 Affected Systems

Products:
  • Salon booking system WordPress plugin
Versions: All versions up to and including 10.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via remote code execution, allowing attackers to install malware, steal data, or use the server for further attacks.

🟠

Likely Case

Website defacement, malware distribution, or backdoor installation leading to data theft and unauthorized access.

🟢

If Mitigated

Limited impact with proper file upload restrictions and web application firewalls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST requests can trigger the vulnerability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3103584/salon-booking-system/trunk/src/SLN/Action/Ajax/ImportAssistants.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Salon booking system plugin. 4. Click Update Now to version 10.3+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Salon booking system plugin until patched.

wp plugin deactivate salon-booking-system

Web Application Firewall rule

all

Block requests to the vulnerable endpoint.

Block POST requests to /wp-admin/admin-ajax.php?action=sln_import_assistants

🧯 If You Can't Patch

  • Implement strict file upload restrictions at web server level
  • Deploy intrusion detection systems to monitor for file upload attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Salon booking system version. If version is 10.2 or lower, you are vulnerable.

Check Version:

wp plugin get salon-booking-system --field=version

Verify Fix Applied:

Confirm plugin version is 10.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=sln_import_assistants
  • Unexpected file uploads in uploads directory

Network Indicators:

  • HTTP POST requests with file uploads to vulnerable endpoint from unauthenticated sources

SIEM Query:

source="web_server" AND (uri="/wp-admin/admin-ajax.php" AND parameters.action="sln_import_assistants")

🔗 References

📤 Share & Export