Skip to main content

CVE-2022-0421: CWE-116 Improper Encoding or Escaping of Output in Unknown Five Star Restaurant Reservations

Medium
VulnerabilityCVE-2022-0421cvecve-2022-0421cwe-116
Published: Mon Nov 21 2022 (11/21/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Five Star Restaurant Reservations

Description

The Five Star Restaurant Reservations WordPress plugin before 2.4.12 does not have authorisation when changing whether a payment was successful or failed, allowing unauthenticated users to change the payment status of arbitrary bookings. Furthermore, due to the lack of sanitisation and escaping, attackers could perform Cross-Site Scripting attacks against a logged in admin viewing the failed payments

AI-Powered Analysis

AILast updated: 06/25/2025, 07:01:52 UTC

Technical Analysis

CVE-2022-0421 is a medium-severity vulnerability affecting the Five Star Restaurant Reservations WordPress plugin versions prior to 2.4.12. The core issue arises from improper authorization controls and insufficient output encoding or escaping (CWE-116). Specifically, the plugin lacks proper authorization checks when changing the payment status of bookings, allowing unauthenticated attackers to arbitrarily modify payment statuses from successful to failed or vice versa. This unauthorized modification can disrupt booking and payment workflows, potentially leading to financial discrepancies or fraudulent booking confirmations. Additionally, the plugin fails to sanitize and escape output correctly, enabling Cross-Site Scripting (XSS) attacks. An attacker can inject malicious scripts that execute in the context of an authenticated administrator viewing the failed payments page. This XSS vector requires the victim to be logged in and to view the manipulated data, but it can lead to session hijacking, privilege escalation, or further compromise of the WordPress administrative environment. The vulnerability has a CVSS 3.1 base score of 6.1, reflecting network exploitability without privileges but requiring user interaction (an admin viewing the page). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known public exploits have been reported, and no official patches or vendor information are available, suggesting the plugin may be from a smaller or less widely known vendor. The vulnerability was published on November 21, 2022, and is tracked by WPScan and CISA, indicating recognition by security authorities.

Potential Impact

For European organizations using the Five Star Restaurant Reservations plugin, this vulnerability poses risks to the integrity and reliability of their booking and payment systems. Unauthorized modification of payment statuses can lead to financial losses, customer dissatisfaction, and reputational damage. The XSS vulnerability threatens administrative account security, potentially allowing attackers to hijack sessions or execute arbitrary code within the WordPress admin interface. This could lead to broader site compromise, data leakage, or further malware deployment. Organizations in the hospitality sector, especially small to medium-sized restaurants relying on this plugin for online reservations, are at risk. The impact is heightened for businesses processing sensitive customer payment data under GDPR, as exploitation could lead to data breaches and regulatory penalties. Furthermore, if attackers leverage this vulnerability to disrupt booking operations, it could affect service availability indirectly through operational disruption. Given the unauthenticated nature of the payment status modification, the attack surface is broad, increasing the likelihood of exploitation attempts.

Mitigation Recommendations

Since no official patches are currently available, European organizations should take immediate compensating controls. First, restrict access to the WordPress admin interface using IP whitelisting or VPNs to limit exposure to trusted personnel only. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to modify payment statuses or inject scripts. Regularly audit booking and payment records for anomalies indicating unauthorized changes. Disable or remove the Five Star Restaurant Reservations plugin if feasible until a patched version is released. If removal is not possible, consider isolating the plugin's functionality or replacing it with a more secure alternative. Educate administrators to avoid clicking on suspicious links or viewing untrusted input in the admin interface. Enable Content Security Policy (CSP) headers to mitigate the impact of XSS attacks by restricting script execution sources. Monitor security advisories for updates or patches from the plugin vendor or WordPress community. Finally, ensure all WordPress core and other plugins are up to date to reduce the overall attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-01-31T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee017

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 7:01:52 AM

Last updated: 8/12/2025, 2:38:28 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats