Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6552: CWE-200 Information Exposure in ameliabooking Booking for Appointments and Events Calendar – Amelia

0
Medium
VulnerabilityCVE-2024-6552cvecve-2024-6552cwe-200
Published: Thu Aug 08 2024 (08/08/2024, 03:30:46 UTC)
Source: CVE Database V5
Vendor/Project: ameliabooking
Product: Booking for Appointments and Events Calendar – Amelia

Description

CVE-2024-6552 is a medium severity information exposure vulnerability in the Amelia Booking for Appointments and Events Calendar WordPress plugin. It allows unauthenticated attackers to retrieve the full filesystem path of the web application due to display_errors being enabled in Symfony test files. This full path disclosure does not directly compromise confidentiality, integrity, or availability but can aid attackers in crafting further attacks if combined with other vulnerabilities. The vulnerability affects all versions up to and including 1. 2 of the plugin. Exploitation requires no authentication or user interaction, and no known exploits are currently in the wild. Organizations using this plugin should disable display_errors in production and update or patch the plugin when a fix becomes available. The threat primarily impacts websites using this specific WordPress plugin, which is popular globally but especially in countries with high WordPress adoption. The overall severity is medium given the limited direct impact and the need for additional vulnerabilities to cause damage.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:14:34 UTC

Technical Analysis

CVE-2024-6552 is an information exposure vulnerability classified under CWE-200 affecting the Amelia Booking for Appointments and Events Calendar plugin for WordPress. The root cause is that the plugin uses the Symfony framework and leaves the display_errors setting enabled within test files. This misconfiguration causes error messages to reveal the full filesystem path of the web application when triggered. The vulnerability exists in all versions up to and including 1.2 of the plugin. An unauthenticated attacker can exploit this flaw remotely without any user interaction by triggering an error that causes the path disclosure. While the disclosed information (full path) does not directly expose sensitive data such as credentials or personal information, it can provide valuable intelligence to attackers. Knowing the full path can help attackers tailor further attacks such as local file inclusion, remote code execution, or privilege escalation if other vulnerabilities are present. No direct integrity or availability impact occurs from this vulnerability alone. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation but limited impact. No known public exploits or active exploitation campaigns have been reported. The vulnerability highlights the risk of leaving debug or error display settings enabled in production environments and the importance of secure configuration management in WordPress plugins.

Potential Impact

The primary impact of CVE-2024-6552 is information disclosure that can aid attackers in reconnaissance and subsequent exploitation steps. While the vulnerability itself does not allow data theft, code execution, or service disruption, the full path disclosure can facilitate more targeted and effective attacks if combined with other vulnerabilities such as file inclusion or code injection flaws. Organizations running websites with the affected Amelia plugin may face increased risk of compromise if they do not address this issue. The impact is more significant for high-value targets or websites handling sensitive user data, as attackers can leverage the disclosed information to escalate attacks. However, the vulnerability alone does not cause direct damage or data loss. The medium severity rating reflects this limited but non-negligible risk. Since the plugin is used globally, any organization relying on it should consider the potential exposure, especially those in sectors like e-commerce, healthcare, or finance where appointment booking is common and data sensitivity is high.

Mitigation Recommendations

1. Immediately disable display_errors and any debug or verbose error reporting settings in the production environment to prevent error messages from revealing sensitive information. 2. Update the Amelia Booking plugin to a fixed version once the vendor releases a patch addressing this vulnerability. 3. If an official patch is not yet available, consider temporarily removing or disabling the plugin until a fix is applied. 4. Conduct a thorough security review of the WordPress environment to identify and remediate any other vulnerabilities that could be chained with this information disclosure. 5. Implement web application firewalls (WAF) with rules to block or monitor suspicious requests that may trigger error messages. 6. Restrict access to test files or directories that may contain debug configurations. 7. Regularly audit plugin configurations and error handling settings as part of security hygiene. 8. Monitor logs for unusual error-triggering requests that could indicate reconnaissance attempts. These steps go beyond generic advice by focusing on configuration management, layered defenses, and proactive monitoring specific to this vulnerability's nature.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-08T14:11:37.653Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c06b7ef31ef0b55f1b1

Added to database: 2/25/2026, 9:39:18 PM

Last enriched: 2/26/2026, 3:14:34 AM

Last updated: 2/26/2026, 8:05:16 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats