Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10729: CWE-285 Improper Authorization in Tyche Softwares Booking & Appointment Plugin for WooCommerce

0
High
VulnerabilityCVE-2024-10729cvecve-2024-10729cwe-285
Published: Tue Nov 26 2024 (11/26/2024, 02:06:33 UTC)
Source: CVE Database V5
Vendor/Project: Tyche Softwares
Product: Booking & Appointment Plugin for WooCommerce

Description

CVE-2024-10729 is a high-severity vulnerability in the Booking & Appointment Plugin for WooCommerce by Tyche Softwares, affecting all versions up to 6. 9. 0. The flaw arises from a missing capability check in the 'save_google_calendar_data' function, allowing authenticated users with subscriber-level permissions or higher to modify site options arbitrarily. This improper authorization (CWE-285) can lead to full compromise of site confidentiality, integrity, and availability without requiring user interaction. The vulnerability has a CVSS score of 8. 8, indicating critical impact potential. No public exploits are known yet, but the ease of exploitation and broad impact make timely patching essential. Organizations using this plugin on WordPress sites, especially those relying on WooCommerce for bookings and appointments, are at significant risk. Mitigation involves applying vendor patches once available, restricting user roles, and monitoring for suspicious changes to site options.

AI-Powered Analysis

AILast updated: 02/26/2026, 08:57:47 UTC

Technical Analysis

CVE-2024-10729 is a vulnerability classified under CWE-285 (Improper Authorization) found in the Booking & Appointment Plugin for WooCommerce, developed by Tyche Softwares. This plugin is widely used on WordPress sites to manage bookings and appointments. The vulnerability exists because the 'save_google_calendar_data' function lacks proper capability checks, allowing any authenticated user with subscriber-level permissions or higher to invoke this function and update site options arbitrarily. Site options in WordPress control critical configuration settings, and unauthorized modification can lead to severe consequences including site defacement, data leakage, privilege escalation, or complete site takeover. The vulnerability affects all versions up to and including 6.9.0. The CVSS v3.1 score is 8.8 (high), reflecting network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability is straightforward to exploit by any authenticated user, including subscribers, which are common roles on WordPress sites. This makes the threat particularly dangerous for sites that allow user registration or have multiple users with low privileges. The vulnerability was published on November 26, 2024, and no official patches are linked yet, indicating the need for close monitoring of vendor updates. The flaw could be leveraged to manipulate site settings, inject malicious configurations, or disrupt normal site operations, severely impacting business continuity and trust.

Potential Impact

The impact of CVE-2024-10729 is significant for organizations using the affected plugin on WordPress sites. Unauthorized modification of site options can lead to complete compromise of the website, including data breaches, defacement, or persistent backdoors. Attackers with subscriber-level access can escalate privileges or alter critical configurations, potentially disrupting booking and appointment services, which are often business-critical. This can result in loss of customer trust, financial losses, and reputational damage. The vulnerability's ease of exploitation and high impact on confidentiality, integrity, and availability make it a critical risk for e-commerce, service providers, and any organization relying on WooCommerce for customer interactions. Additionally, the lack of user interaction requirement means automated attacks or mass exploitation campaigns could emerge quickly once exploit code becomes available. Organizations with multi-user environments or open registration are particularly vulnerable, increasing the attack surface and likelihood of exploitation.

Mitigation Recommendations

To mitigate CVE-2024-10729, organizations should: 1) Monitor Tyche Softwares' official channels for patches and apply updates immediately once available. 2) Temporarily restrict user roles and permissions, especially limiting subscriber-level users from accessing or triggering booking plugin functions. 3) Implement strict role-based access controls (RBAC) and audit user capabilities regularly to ensure minimal privileges. 4) Use Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable function. 5) Monitor WordPress site options and configuration changes for unauthorized modifications using file integrity monitoring and logging tools. 6) Consider disabling or replacing the affected plugin if immediate patching is not possible. 7) Educate site administrators about the risks of granting unnecessary permissions to low-privilege users. 8) Conduct regular security assessments and penetration tests focusing on plugin vulnerabilities and authorization controls. These steps go beyond generic advice by focusing on access control hardening, monitoring, and proactive risk reduction tailored to this specific vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-02T06:41:45.827Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dfcb7ef31ef0b5923e3

Added to database: 2/25/2026, 9:47:40 PM

Last enriched: 2/26/2026, 8:57:47 AM

Last updated: 2/26/2026, 9:39:27 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats