Lucene search

K
cvelistPatchstackCVELIST:CVE-2023-26526
HistoryMay 17, 2024 - 6:41 a.m.

CVE-2023-26526 WordPress Bookly plugin <= 21.7.1 - Authenticated Arbitrary File Deletion vulnerability

2024-05-1706:41:23
CWE-22
Patchstack
www.cve.org
cve-2023-26526
wordpress bookly
authenticated
arbitrary file deletion
nota-info
path traversal
restricted directory
web input
file system calls

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

10.5%

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Nota-Info Bookly allows Path Traversal, Manipulating Web Input to File System Calls.This issue affects Bookly: from n/a through 21.7.1.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "bookly-responsive-appointment-booking-tool",
    "product": "Bookly",
    "vendor": "Nota-Info",
    "versions": [
      {
        "changes": [
          {
            "at": "21.8",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "21.7.1",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

10.5%

Related for CVELIST:CVE-2023-26526