Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7112: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dotonpaper Pinpoint Booking System – #1 WordPress Booking Plugin

0
High
VulnerabilityCVE-2024-7112cvecve-2024-7112cwe-89
Published: Sat Sep 07 2024 (09/07/2024, 11:17:04 UTC)
Source: CVE Database V5
Vendor/Project: dotonpaper
Product: Pinpoint Booking System – #1 WordPress Booking Plugin

Description

CVE-2024-7112 is a high-severity SQL Injection vulnerability in the Pinpoint Booking System WordPress plugin, affecting all versions up to 2. 9. 9. 5. 0. Authenticated users with Subscriber-level access or higher can exploit insufficient input sanitization on the 'schedule' parameter to inject malicious SQL commands. This allows attackers to extract sensitive database information, potentially compromising confidentiality, integrity, and availability of the affected WordPress sites. No user interaction beyond authentication is required, and the vulnerability is remotely exploitable over the network. Although no known exploits are currently reported in the wild, the ease of exploitation and high impact make this a critical issue for websites using this plugin. Organizations should prioritize patching or applying mitigations to prevent data breaches and maintain site integrity.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:29:41 UTC

Technical Analysis

CVE-2024-7112 identifies a critical SQL Injection vulnerability in the Pinpoint Booking System plugin for WordPress, a widely used booking management tool. The flaw exists due to improper neutralization of special elements in SQL commands, specifically within the 'schedule' parameter, which is insufficiently escaped and lacks proper query preparation. This vulnerability allows authenticated users with minimal privileges (Subscriber-level and above) to append arbitrary SQL queries to existing database commands. Exploiting this can lead to unauthorized data disclosure, modification, or deletion within the WordPress database, impacting sensitive information such as user data, booking details, and site configurations. The vulnerability is remotely exploitable without user interaction beyond authentication, increasing its risk profile. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and network vector. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation make it a significant threat. The lack of available patches at the time of disclosure necessitates immediate attention from site administrators to implement compensating controls or monitor for suspicious activity.

Potential Impact

The exploitation of CVE-2024-7112 can have severe consequences for organizations using the Pinpoint Booking System plugin. Attackers can extract sensitive data from the database, including personal user information, booking records, and potentially administrative credentials. This compromises confidentiality and may lead to privacy violations or regulatory non-compliance. The integrity of the database can be undermined by unauthorized modifications or deletions, disrupting business operations and trustworthiness of the booking system. Availability may also be affected if attackers execute destructive queries or cause database corruption. Since the vulnerability requires only low-privilege authenticated access, insider threats or compromised accounts can be leveraged to escalate damage. The widespread use of WordPress and this popular plugin means a large attack surface exists globally, increasing the risk of targeted attacks on hospitality, event management, and service industries relying on this software.

Mitigation Recommendations

To mitigate CVE-2024-7112, organizations should immediately update the Pinpoint Booking System plugin once an official patch is released by the vendor. Until then, administrators should restrict Subscriber-level user capabilities to the minimum necessary and monitor logs for unusual SQL query patterns or database errors indicative of injection attempts. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the 'schedule' parameter can provide interim protection. Employing database query parameterization and input validation at the application level is critical; if possible, apply custom code fixes to sanitize inputs before they reach the database. Regularly audit user accounts to remove or disable unnecessary low-privilege users to reduce attack vectors. Additionally, maintain frequent backups of the database to enable recovery in case of data tampering or loss. Monitoring for anomalous database access patterns and integrating intrusion detection systems can help identify exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-25T16:59:29.840Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c0fb7ef31ef0b55f84a

Added to database: 2/25/2026, 9:39:27 PM

Last enriched: 2/26/2026, 3:29:41 AM

Last updated: 2/26/2026, 8:48:12 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats