CVE-2024-33543

7.5 HIGH

📋 TL;DR

CVE-2024-33543 is a missing authorization vulnerability in the WP Time Slots Booking Form WordPress plugin that allows attackers to bypass access controls and perform unauthorized actions. This affects all WordPress sites running the plugin version 1.2.06 or earlier. Attackers could potentially modify booking data or access restricted functionality.

💻 Affected Systems

Products:
  • WP Time Slots Booking Form WordPress Plugin
Versions: n/a through 1.2.06
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using the vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate booking data, delete reservations, access sensitive booking information, or potentially escalate privileges to compromise the WordPress site.

🟠

Likely Case

Unauthorized users could modify or delete existing bookings, disrupt booking operations, or access booking details they shouldn't see.

🟢

If Mitigated

With proper authorization checks, only authenticated users with appropriate permissions could access booking management functions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of WordPress plugin structure but is technically simple once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.07 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wp-time-slots-booking-form/wordpress-wp-time-slots-booking-form-plugin-1-2-06-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'WP Time Slots Booking Form'
4. Click 'Update Now' if available
5. If no update appears, download version 1.2.07+ from WordPress.org
6. Deactivate old plugin, upload new version, activate

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate wp-time-slots-booking-form

Restrict Access

all

Use web application firewall to restrict access to booking endpoints

🧯 If You Can't Patch

  • Disable the WP Time Slots Booking Form plugin immediately
  • Implement strict network access controls to limit who can access the WordPress admin interface

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WP Time Slots Booking Form version

Check Version:

wp plugin get wp-time-slots-booking-form --field=version

Verify Fix Applied:

Verify plugin version is 1.2.07 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to booking endpoints
  • Unexpected modifications to booking data

Network Indicators:

  • Unusual POST requests to booking management endpoints from unauthorized IPs

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "booking") AND status_code=200 AND user_agent NOT CONTAINS "admin"

🔗 References

📤 Share & Export