CVE-2024-10215
Published: 09 January 2025
Description
The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.
Security Summary
CVE-2024-10215 is an authorization bypass vulnerability in the WPBookit plugin for WordPress, affecting versions up to and including 1.6.4. The flaw, classified under CWE-639 (Authorization Bypass Through User-Controlled Key), stems from the plugin providing user-controlled access to objects, allowing attackers to bypass authorization checks and access system resources. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites.
Unauthenticated attackers can exploit this vulnerability remotely without user interaction. By leveraging the user-controlled object access, they can arbitrarily change passwords for any WordPress user, including administrators, potentially enabling full account takeover and unauthorized site control.
Advisories from Wordfence and the WPBookit plugin's change log provide details on the issue. Security practitioners should refer to these sources for patch information, with mitigation centered on updating to a version beyond 1.6.4.
Details
- CWE(s)