The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.
References
| Link | Resource |
|---|---|
| https://documentation.iqonic.design/wpbookit/versions/change-log | Release Notes |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/2d23a2b9-8476-4564-a5de-5e6cfc38ce68?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-01-09 20:15
Updated : 2025-06-27 17:37
NVD link : CVE-2024-10215
Mitre link : CVE-2024-10215
CVE.ORG link : CVE-2024-10215
JSON object : View
Products Affected
iqonic
- wpbookit
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
