The WP Hotel Booking plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_review() function in all versions up to, and including, 2.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible. August 3, 2024 – We received the submission for the Arbitrary File Upload vulnerability in WP Hotel Booking via the Wordfence Bug Bounty Program. On August 3rd, 2024, we received a submission for an Arbitrary File Upload vulnerability in WP Hotel Booking, a WordPress plugin with more than 8,000 active installations. August 15, 2024 – Wordfence Premium, Care, and Response users received a firewall rule to provide protection against any exploits that may target this vulnerability. Wordfence Premium, Wordfence Care, and Wordfence Response users received a firewall rule to protect against any exploits targeting this vulnerability on August 15, 2024. Wordfence Premium, Wordfence Care, and Wordfence Response users received a firewall rule to protect against any exploits targeting this vulnerability on August 15, 2024. Sites using the free version of Wordfence received the same protection 30 days later on September 14, 2024. Sites using the free version of Wordfence received the same protection 30 days later on September 14, 2024. We encourage WordPress users to verify that their sites are updated to the latest patched version of WP Hotel Booking as soon as possible considering the critical nature of this vulnerability. This vulnerability can be used by authenticated attackers, with subscriber-level access and above, to upload arbitrary files to a vulnerable site and achieve remote code execution, which is typically leveraged for a complete site takeover. ???? Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In this blog post, we detailed an Arbitrary File Upload vulnerability within the WP Hotel Booking plugin affecting versions 2.1.2 and earlier. This makes it possible for attackers, with authenticated access such as subscribers, to upload arbitrary malicious PHP code and then access the file to trigger remote code execution on the server. September 14, 2024 – Wordfence free users received the same protection. In addition, through October 14th, 2024, researchers can earn up to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.
This Cyber News was published on www.wordfence.com. Publication date: Tue, 01 Oct 2024 16:43:06 +0000