Lucene search

K
vulnrichmentPatchstackVULNRICHMENT:CVE-2023-26526
HistoryMay 17, 2024 - 6:41 a.m.

CVE-2023-26526 WordPress Bookly plugin <= 21.7.1 - Authenticated Arbitrary File Deletion vulnerability

2024-05-1706:41:23
CWE-22
Patchstack
github.com
10
wordpress
bookly
plugin
authenticated
arbitrary file deletion
path traversal
nota-info

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Nota-Info Bookly allows Path Traversal, Manipulating Web Input to File System Calls.This issue affects Bookly: from n/a through 21.7.1.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "bookly-responsive-appointment-booking-tool",
    "product": "Bookly",
    "vendor": "Nota-Info",
    "versions": [
      {
        "changes": [
          {
            "at": "21.8",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "21.7.1",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.5%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-26526