Skip to main content

CVE-2024-13616: CWE-79 Cross-Site Scripting (XSS) in Unknown VikBooking Hotel Booking Engine & PMS

Medium
VulnerabilityCVE-2024-13616cvecve-2024-13616cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:07:03 UTC)
Source: CVE
Vendor/Project: Unknown
Product: VikBooking Hotel Booking Engine & PMS

Description

The VikBooking Hotel Booking Engine & PMS WordPress plugin before 1.7.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 07:43:42 UTC

Technical Analysis

CVE-2024-13616 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the VikBooking Hotel Booking Engine & PMS WordPress plugin versions prior to 1.7.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The attack vector requires the attacker to have high privileges (admin level) and some user interaction to trigger the stored XSS payload. The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or unauthorized actions performed in the context of the admin user. The CVSS v3.1 base score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. There are no known exploits in the wild at this time, and no official patches or updates have been linked yet. The vulnerability affects a niche WordPress plugin used primarily for hotel booking and property management systems, which may be deployed by hospitality businesses. The stored XSS could be leveraged by malicious insiders or compromised admin accounts to escalate attacks within the WordPress environment or pivot to other systems.

Potential Impact

For European organizations, especially those in the hospitality sector using WordPress with the VikBooking plugin, this vulnerability poses a risk of internal compromise and data leakage. Exploitation could allow attackers to execute arbitrary scripts in the context of admin users, potentially leading to theft of sensitive booking data, customer personal information, or manipulation of booking records. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and operational disruptions. Since the vulnerability requires admin privileges, the main risk vector is insider threats or compromised admin accounts. However, once exploited, attackers could also use the XSS to deploy further attacks such as phishing or malware distribution within the organization’s network. The impact on availability is minimal, but the integrity and confidentiality of data are at risk. European hospitality businesses that rely on this plugin for online booking and property management could face targeted attacks aiming to disrupt services or steal customer data.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the use of the VikBooking Hotel Booking Engine & PMS plugin. If present, verify the plugin version and upgrade to version 1.7.2 or later once available, as this version addresses the sanitization and escaping issues. Until a patch is released, restrict admin access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. Additionally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly monitor logs for suspicious admin activity and conduct security awareness training focused on phishing and social engineering to prevent credential compromise. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block suspicious input patterns related to the plugin’s settings. Finally, perform regular vulnerability scanning and penetration testing to identify any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-01-22T14:37:35.326Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec227

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:43:42 AM

Last updated: 7/26/2025, 8:12:21 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats