CVE-2024-38737

5.4 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the ReDi Restaurant Reservation WordPress plugin that allows attackers to access functionality not properly constrained by access controls. Attackers can perform unauthorized actions that should require authentication. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • ReDi Restaurant Reservation WordPress Plugin
Versions: All versions up to and including 24.0422
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the ReDi Restaurant Reservation plugin enabled. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify restaurant reservations, access customer data, or manipulate booking systems without authentication, potentially leading to data exposure or service disruption.

🟠

Likely Case

Unauthenticated users accessing reservation management functions, viewing booking details, or making unauthorized changes to the reservation system.

🟢

If Mitigated

Proper access controls would prevent unauthorized access, limiting functionality to authenticated administrators only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Broken access control vulnerabilities typically require minimal technical skill to exploit once the vulnerable endpoints are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 24.0422

Vendor Advisory: https://patchstack.com/database/vulnerability/redi-restaurant-resaurant-reservation/wordpress-redi-restaurant-reservation-plugin-24-0422-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find ReDi Restaurant Reservation plugin
4. Click 'Update Now' if available
5. If no update available, deactivate and remove the plugin
6. Reinstall latest version from WordPress repository

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate redi-restaurant-reservation

Restrict Access via Web Application Firewall

all

Block access to plugin-specific endpoints

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to WordPress admin areas
  • Enable WordPress security plugins that monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for ReDi Restaurant Reservation version. If version is 24.0422 or earlier, you are vulnerable.

Check Version:

wp plugin get redi-restaurant-reservation --field=version

Verify Fix Applied:

After updating, verify plugin version is higher than 24.0422 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-content/plugins/redi-restaurant-reservation/ endpoints
  • 403 errors followed by 200 success codes for same endpoints

Network Indicators:

  • HTTP requests to plugin endpoints without authentication cookies
  • Unusual patterns of reservation-related API calls

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/redi-restaurant-reservation/" OR plugin="redi-restaurant-reservation") AND (response_code=200 OR response_code=403)

🔗 References

📤 Share & Export