CVE-2024-7855: CWE-434 Unrestricted Upload of File with Dangerous Type in thimpress WP Hotel Booking
CVE-2024-7855 is a high-severity vulnerability in the WP Hotel Booking WordPress plugin by thimpress, affecting all versions up to 2. 1. 2. It allows authenticated users with subscriber-level access or higher to upload arbitrary files due to missing file type validation in the update_review() function. This unrestricted file upload can lead to remote code execution on the affected server. The vulnerability requires no user interaction beyond authentication and has a CVSS score of 8. 8, indicating a critical impact on confidentiality, integrity, and availability. No public exploits are currently known. Organizations running WordPress sites with this plugin are at risk, especially those with multiple user roles. Immediate patching or mitigation is essential to prevent potential compromise.
AI Analysis
Technical Summary
CVE-2024-7855 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the WP Hotel Booking plugin for WordPress, developed by thimpress. The flaw exists in the update_review() function, which fails to validate the type of files uploaded by authenticated users. This lack of validation allows attackers with subscriber-level privileges or higher to upload arbitrary files to the server hosting the WordPress site. Since WordPress plugins often run with web server privileges, such arbitrary file uploads can be leveraged to execute remote code, potentially leading to full server compromise. The vulnerability affects all versions up to and including 2.1.2 of the plugin. The CVSS 3.1 base score is 8.8, reflecting a high severity due to network attack vector (no physical access needed), low attack complexity, and privileges required at the subscriber level. No user interaction is required beyond authentication. The vulnerability impacts confidentiality, integrity, and availability by enabling attackers to execute malicious code, steal data, or disrupt services. Although no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of WordPress and this plugin make it a significant threat. The vulnerability was publicly disclosed on October 2, 2024, and no official patches have been linked yet, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-7855 is substantial for organizations using the WP Hotel Booking plugin. An attacker with minimal privileges (subscriber-level) can upload arbitrary files, potentially leading to remote code execution. This can result in full server compromise, data breaches, defacement of websites, or use of the server as a pivot point for further attacks within the network. For businesses in the hospitality and tourism sectors relying on this plugin, the risk includes loss of customer data, disruption of booking services, and reputational damage. The vulnerability also threatens the confidentiality of sensitive customer information and the integrity of the website content. Since WordPress powers a significant portion of the web, and this plugin is popular among hotel and booking sites, the scope of affected systems is broad. The ease of exploitation and the lack of required user interaction increase the likelihood of attacks once exploit code becomes available. Organizations without proper access controls or monitoring are particularly vulnerable.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the WP Hotel Booking plugin and its version. Until an official patch is released, administrators should restrict subscriber-level users from uploading files or disable the update_review() functionality if possible. Implementing web application firewall (WAF) rules to detect and block suspicious file uploads targeting this plugin can provide temporary protection. Monitoring file upload directories for unauthorized or unusual files can help detect exploitation attempts. Additionally, enforcing the principle of least privilege by limiting user roles and permissions reduces the attack surface. Regular backups and incident response plans should be updated to prepare for potential exploitation. Once a patch is available, prompt application is critical. Organizations should also consider isolating WordPress environments and using security plugins that enforce strict file upload validation.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Brazil, Italy, Spain
CVE-2024-7855: CWE-434 Unrestricted Upload of File with Dangerous Type in thimpress WP Hotel Booking
Description
CVE-2024-7855 is a high-severity vulnerability in the WP Hotel Booking WordPress plugin by thimpress, affecting all versions up to 2. 1. 2. It allows authenticated users with subscriber-level access or higher to upload arbitrary files due to missing file type validation in the update_review() function. This unrestricted file upload can lead to remote code execution on the affected server. The vulnerability requires no user interaction beyond authentication and has a CVSS score of 8. 8, indicating a critical impact on confidentiality, integrity, and availability. No public exploits are currently known. Organizations running WordPress sites with this plugin are at risk, especially those with multiple user roles. Immediate patching or mitigation is essential to prevent potential compromise.
AI-Powered Analysis
Technical Analysis
CVE-2024-7855 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the WP Hotel Booking plugin for WordPress, developed by thimpress. The flaw exists in the update_review() function, which fails to validate the type of files uploaded by authenticated users. This lack of validation allows attackers with subscriber-level privileges or higher to upload arbitrary files to the server hosting the WordPress site. Since WordPress plugins often run with web server privileges, such arbitrary file uploads can be leveraged to execute remote code, potentially leading to full server compromise. The vulnerability affects all versions up to and including 2.1.2 of the plugin. The CVSS 3.1 base score is 8.8, reflecting a high severity due to network attack vector (no physical access needed), low attack complexity, and privileges required at the subscriber level. No user interaction is required beyond authentication. The vulnerability impacts confidentiality, integrity, and availability by enabling attackers to execute malicious code, steal data, or disrupt services. Although no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of WordPress and this plugin make it a significant threat. The vulnerability was publicly disclosed on October 2, 2024, and no official patches have been linked yet, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-7855 is substantial for organizations using the WP Hotel Booking plugin. An attacker with minimal privileges (subscriber-level) can upload arbitrary files, potentially leading to remote code execution. This can result in full server compromise, data breaches, defacement of websites, or use of the server as a pivot point for further attacks within the network. For businesses in the hospitality and tourism sectors relying on this plugin, the risk includes loss of customer data, disruption of booking services, and reputational damage. The vulnerability also threatens the confidentiality of sensitive customer information and the integrity of the website content. Since WordPress powers a significant portion of the web, and this plugin is popular among hotel and booking sites, the scope of affected systems is broad. The ease of exploitation and the lack of required user interaction increase the likelihood of attacks once exploit code becomes available. Organizations without proper access controls or monitoring are particularly vulnerable.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the WP Hotel Booking plugin and its version. Until an official patch is released, administrators should restrict subscriber-level users from uploading files or disable the update_review() functionality if possible. Implementing web application firewall (WAF) rules to detect and block suspicious file uploads targeting this plugin can provide temporary protection. Monitoring file upload directories for unauthorized or unusual files can help detect exploitation attempts. Additionally, enforcing the principle of least privilege by limiting user roles and permissions reduces the attack surface. Regular backups and incident response plans should be updated to prepare for potential exploitation. Once a patch is available, prompt application is critical. Organizations should also consider isolating WordPress environments and using security plugins that enforce strict file upload validation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-15T16:46:42.025Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c20b7ef31ef0b560354
Added to database: 2/25/2026, 9:39:44 PM
Last enriched: 2/26/2026, 3:49:50 AM
Last updated: 2/26/2026, 8:56:08 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.