CVE-2024-6467: CWE-73 External Control of File Name or Path in reputeinfosystems Appointment Booking Calendar Plugin and Scheduling Plugin – BookingPress
The BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin plugin for WordPress is vulnerable to Arbitrary File Read to Arbitrary File Creation in all versions up to, and including, 1.1.5 via the 'bookingpress_save_lite_wizard_settings_func' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary files that contain the content of files (either on the local server or from a remote location), allowing the execution of any PHP code in those files or the exposure of sensitive information.
AI Analysis
Technical Summary
The BookingPress WordPress plugin suffers from an External Control of File Name or Path vulnerability (CWE-73) that enables authenticated attackers with low privileges (Subscriber and above) to perform arbitrary file read and arbitrary file creation. Exploitation occurs through the 'bookingpress_save_lite_wizard_settings_func' function, allowing attackers to write files containing contents from local or remote sources. This can result in remote code execution or data disclosure. The vulnerability affects all plugin versions up to and including 1.1.5. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability.
Potential Impact
Successful exploitation allows attackers with minimal privileges to create arbitrary files on the server, potentially leading to remote code execution and full compromise of the affected system. Confidentiality, integrity, and availability of the server and hosted data are all at high risk. This vulnerability can expose sensitive information and enable execution of malicious PHP code.
Mitigation Recommendations
No official patch or fix is currently confirmed or available for this vulnerability. Users should monitor the vendor's advisory for updates and apply any official patches once released. Until then, restrict plugin usage to trusted users only and consider disabling or removing the plugin if possible to mitigate risk.
CVE-2024-6467: CWE-73 External Control of File Name or Path in reputeinfosystems Appointment Booking Calendar Plugin and Scheduling Plugin – BookingPress
Description
The BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin plugin for WordPress is vulnerable to Arbitrary File Read to Arbitrary File Creation in all versions up to, and including, 1.1.5 via the 'bookingpress_save_lite_wizard_settings_func' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary files that contain the content of files (either on the local server or from a remote location), allowing the execution of any PHP code in those files or the exposure of sensitive information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The BookingPress WordPress plugin suffers from an External Control of File Name or Path vulnerability (CWE-73) that enables authenticated attackers with low privileges (Subscriber and above) to perform arbitrary file read and arbitrary file creation. Exploitation occurs through the 'bookingpress_save_lite_wizard_settings_func' function, allowing attackers to write files containing contents from local or remote sources. This can result in remote code execution or data disclosure. The vulnerability affects all plugin versions up to and including 1.1.5. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability.
Potential Impact
Successful exploitation allows attackers with minimal privileges to create arbitrary files on the server, potentially leading to remote code execution and full compromise of the affected system. Confidentiality, integrity, and availability of the server and hosted data are all at high risk. This vulnerability can expose sensitive information and enable execution of malicious PHP code.
Mitigation Recommendations
No official patch or fix is currently confirmed or available for this vulnerability. Users should monitor the vendor's advisory for updates and apply any official patches once released. Until then, restrict plugin usage to trusted users only and consider disabling or removing the plugin if possible to mitigate risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-07-03T00:36:15.239Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c03b7ef31ef0b55ef7b
Added to database: 2/25/2026, 9:39:15 PM
Last enriched: 4/9/2026, 8:08:34 AM
Last updated: 4/12/2026, 5:31:03 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.