Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11641: CWE-352 Cross-Site Request Forgery (CSRF) in e4jvikwp VikBooking Hotel Booking Engine & PMS

0
High
VulnerabilityCVE-2024-11641cvecve-2024-11641cwe-352
Published: Sun Jan 26 2025 (01/26/2025, 11:09:44 UTC)
Source: CVE Database V5
Vendor/Project: e4jvikwp
Product: VikBooking Hotel Booking Engine & PMS

Description

CVE-2024-11641 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 1. 7. 2 of the VikBooking Hotel Booking Engine & PMS WordPress plugin. The flaw arises from missing or incorrect nonce validation in the plugin's 'save' function, allowing attackers to trick authenticated users, such as site administrators, into executing unauthorized actions. Exploitation requires user interaction but no prior authentication, enabling attackers with subscriber-level privileges or higher to upload arbitrary files to the server. This can lead to remote code execution, compromising the confidentiality, integrity, and availability of affected systems. Although no public exploits are currently known, the vulnerability's ease of exploitation and potential impact make it critical for organizations using this plugin to apply mitigations promptly.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:26:24 UTC

Technical Analysis

The VikBooking Hotel Booking Engine & PMS plugin for WordPress suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2024-11641, classified under CWE-352. This vulnerability exists in all versions up to and including 1.7.2 due to missing or incorrect nonce validation on the 'save' function within the plugin. Nonces are security tokens used to validate the authenticity of requests to prevent CSRF attacks. Without proper nonce validation, an attacker can craft a malicious request that, when executed by an authenticated user (such as an administrator), results in unauthorized changes to plugin access privileges. The attack vector involves tricking a user into clicking a specially crafted link or visiting a malicious webpage. Successful exploitation allows attackers with subscriber-level privileges or above to upload arbitrary files onto the server hosting the WordPress site. This file upload capability can be leveraged to execute remote code, potentially leading to full system compromise. The vulnerability is remotely exploitable over the network, requires no authentication for the initial attack but does require user interaction, and impacts confidentiality, integrity, and availability. The CVSS v3.1 base score is 8.8, indicating a high severity level. No patches or official fixes are currently linked, and no known exploits in the wild have been reported as of the publication date.

Potential Impact

The impact of CVE-2024-11641 on organizations worldwide is significant, especially for those relying on the VikBooking plugin for hotel booking and property management. Successful exploitation can lead to unauthorized privilege escalation, arbitrary file uploads, and remote code execution, potentially resulting in full server compromise. This can cause data breaches exposing sensitive customer and business information, defacement or disruption of booking services, and the deployment of malware or ransomware. The vulnerability undermines trust in the affected websites and can lead to financial losses, reputational damage, and regulatory penalties. Since WordPress is widely used globally and the VikBooking plugin targets hospitality businesses, the threat affects a broad range of organizations, including hotels, travel agencies, and property managers. The requirement for user interaction and the need to trick an authenticated user slightly reduce the attack surface but do not eliminate the risk, as phishing and social engineering remain effective attack vectors. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2024-11641, organizations should immediately implement the following measures: 1) Monitor for updates or patches from the VikBooking plugin developers and apply them as soon as they become available. 2) In the absence of official patches, consider temporarily disabling the VikBooking plugin or restricting its use to trusted administrators only. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the plugin's 'save' function, especially those lacking valid nonces. 4) Educate site administrators and users with elevated privileges about the risks of phishing and social engineering attacks to reduce the likelihood of clicking malicious links. 5) Employ strict user role management to limit subscriber-level privileges and ensure that only necessary users have administrative access. 6) Regularly audit and monitor server file systems and web logs for unauthorized file uploads or suspicious activity. 7) Harden the WordPress environment by disabling file editing through the dashboard and restricting file permissions to minimize the impact of potential exploitation. 8) Consider implementing multi-factor authentication (MFA) for administrative accounts to add an additional security layer. These steps collectively reduce the risk of exploitation and limit potential damage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-22T21:40:59.251Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e18b7ef31ef0b595152

Added to database: 2/25/2026, 9:48:08 PM

Last enriched: 2/26/2026, 6:26:24 AM

Last updated: 2/26/2026, 6:30:03 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats