The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the vcita_logout_callback function in versions up to, and including, 4.2.10. This makes it possible for unauthenticated to logout a vctia connected account which would cause a denial of service on the appointment scheduler, via a forged request granted they can trick a site user into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/browser/meeting-scheduler-by-vcita/trunk/vcita-ajax-function.php#L55 | Exploit |
https://www.wordfence.com/threat-intel/vulnerabilities/id/f434585c-8533-4788-b0bc-5650390c29a8?source=cve | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-06-03 05:15
Updated : 2023-11-07 04:12
NVD link : CVE-2023-2416
Mitre link : CVE-2023-2416
CVE.ORG link : CVE-2023-2416
JSON object : View
Products Affected
vcita
- online_booking_\&_scheduling_calendar_for_wordpress_by_vcita
CWE
CWE-352
Cross-Site Request Forgery (CSRF)