CVE-2024-4468
📋 TL;DR
The Salon booking system WordPress plugin has an authorization bypass vulnerability that allows authenticated users with subscriber-level access or higher to modify plugin settings and view other users' discount codes. This affects all versions up to and including 9.9. The vulnerability exists due to missing capability checks on admin_init hooks.
💻 Affected Systems
- Salon booking system WordPress plugin
📦 What is this software?
Salon Booking System by Salonbookingsystem
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify booking system settings, steal discount codes intended for other customers, potentially leading to financial loss and data privacy violations.
Likely Case
Subscriber-level users accessing discount codes they shouldn't see, potentially using them for unauthorized discounts.
If Mitigated
Minimal impact with proper user role management and network segmentation.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 9.9
Vendor Advisory: https://plugins.trac.wordpress.org/browser/salon-booking-system
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Salon booking system plugin. 4. Click Update Now or manually upload patched version. 5. Verify plugin version is above 9.9.
🔧 Temporary Workarounds
Temporary role restriction
allTemporarily restrict subscriber and higher roles from accessing admin areas until patch is applied.
Use WordPress role management plugins or custom code to restrict capabilities
🧯 If You Can't Patch
- Implement strict user role management and review all user permissions
- Monitor admin_init hooks and user activity logs for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Salon booking system > Version number. If version is 9.9 or lower, system is vulnerable.
Check Version:
wp plugin list --name='salon-booking-system' --field=version
Verify Fix Applied:
Verify plugin version is above 9.9 and test that subscriber-level users cannot access admin discount functions.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to admin discount functions
- User role escalation attempts
- Multiple failed admin area access from subscriber accounts
Network Indicators:
- Unusual admin area requests from non-admin user accounts
SIEM Query:
source="wordpress" AND (event="admin_init" OR event="discount_export") AND user_role="subscriber"
🔗 References
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLB_Discount/Admin/ExportDiscountsCsv.php#L10
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLB_Discount/Admin/ExportDiscountsCsv.php#L16
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLB_Discount/Admin/ExportDiscountsCsv.php#L7
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLN/Admin/Tools.php#L12
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLN/Admin/Tools.php#L16
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLN/Admin/Tools.php#L231
- https://plugins.trac.wordpress.org/changeset/3098413/salon-booking-system/trunk/src/SLB_Discount/Admin/ExportDiscountsCsv.php
- https://plugins.trac.wordpress.org/changeset/3098413/salon-booking-system/trunk/src/SLN/Admin/Tools.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8b73f864-68b5-4ba8-93a3-37f2564cc240?source=cve
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLB_Discount/Admin/ExportDiscountsCsv.php#L10
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLB_Discount/Admin/ExportDiscountsCsv.php#L16
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLB_Discount/Admin/ExportDiscountsCsv.php#L7
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLN/Admin/Tools.php#L12
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLN/Admin/Tools.php#L16
- https://plugins.trac.wordpress.org/browser/salon-booking-system/trunk/src/SLN/Admin/Tools.php#L231
- https://plugins.trac.wordpress.org/changeset/3098413/salon-booking-system/trunk/src/SLB_Discount/Admin/ExportDiscountsCsv.php
- https://plugins.trac.wordpress.org/changeset/3098413/salon-booking-system/trunk/src/SLN/Admin/Tools.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8b73f864-68b5-4ba8-93a3-37f2564cc240?source=cve