CVE-2024-34799
📋 TL;DR
This CVE describes a Missing Authorization vulnerability in the BookingPress WordPress plugin that allows unauthenticated users to manipulate appointment durations. This affects all WordPress sites running BookingPress versions up to 1.0.82, potentially disrupting booking systems and business operations.
💻 Affected Systems
- BookingPress Appointment Booking WordPress Plugin
📦 What is this software?
Bookingpress by Reputeinfosystems
⚠️ Risk & Real-World Impact
Worst Case
Attackers could manipulate appointment durations to cause service disruption, double-book appointments, or create scheduling conflicts that impact business operations and customer satisfaction.
Likely Case
Unauthenticated users modify appointment durations to create scheduling conflicts, disrupt service availability, or cause minor operational issues.
If Mitigated
With proper authorization controls, only authenticated administrators could modify appointment settings, preventing unauthorized manipulation.
🎯 Exploit Status
The vulnerability requires no authentication and appears to be straightforward to exploit based on the description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.83 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find BookingPress and click 'Update Now'. 4. Verify update to version 1.0.83 or higher.
🔧 Temporary Workarounds
Disable BookingPress Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate bookingpress-appointment-booking
Restrict Access via WAF
allBlock requests to BookingPress endpoints for unauthenticated users
🧯 If You Can't Patch
- Implement web application firewall rules to block unauthenticated requests to BookingPress endpoints
- Disable the BookingPress plugin and use alternative booking solutions temporarily
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > BookingPress version. If version is 1.0.82 or lower, you are vulnerable.
Check Version:
wp plugin get bookingpress-appointment-booking --field=version
Verify Fix Applied:
After updating, verify BookingPress version shows 1.0.83 or higher in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to BookingPress endpoints from unauthenticated IPs
- Multiple failed appointment duration modification attempts
Network Indicators:
- HTTP requests to /wp-content/plugins/bookingpress-appointment-booking/ endpoints without authentication
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-content/plugins/bookingpress-appointment-booking/" OR plugin="bookingpress") AND http_method=POST AND NOT user_authenticated=true
🔗 References
- https://patchstack.com/database/vulnerability/bookingpress-appointment-booking/wordpress-bookingpress-plugin-1-0-82-appointment-duration-manipulation-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/bookingpress-appointment-booking/wordpress-bookingpress-plugin-1-0-82-appointment-duration-manipulation-vulnerability?_s_id=cve