Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-1207 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Unauthenticated SQL Injection in WP Booking Calendar. πŸ’₯ **Consequences**: Attackers can manipulate database queries, leading to data theft, modification, or deletion.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-89**: SQL Injection. πŸ” **Flaw**: Insufficient escaping of user-supplied parameters (`calendar_request_params[dates_ddmmyy_csv]`) before SQL concatenation. Lack of prepared statements.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: wpdevelop. πŸ“‰ **Product**: Booking Calendar. πŸ“… **Versions**: 9.9 and earlier. 🌐 **Platform**: WordPress Plugin.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: Unauthenticated access required. πŸ—„οΈ **Data**: Full database read/write access. πŸ“œ **Impact**: High Confidentiality, Integrity, and Availability impact (CVSS H).

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: LOW. πŸšͺ **Auth**: None required (Unauthenticated). βš™οΈ **Config**: Standard WordPress AJAX endpoint (`admin-ajax.php`). Easy to trigger via POST requests.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit**: YES. πŸ“‚ **PoC**: Publicly available on GitHub (sahar042/CVE-2024-1207). 🌍 **Wild Exploitation**: High risk due to simplicity and lack of auth requirement.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for `admin-ajax.php` with `action=WPBC_AJX_BOOKING__CREATE`. πŸ“‘ **Indicator**: Look for SQL errors or unexpected data in responses when injecting payloads into `dates_ddmmyy_csv`.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update to version > 9.9. πŸ“ **Patch**: Developer released fix in changeset 3032596. βœ… **Status**: Official mitigation available via plugin update.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If unpatched, restrict access to `admin-ajax.php` via WAF rules. 🚫 **Block**: Filter malicious payloads in `dates_ddmmyy_csv` parameter. πŸ›‘ **Disable**: Temporarily disable the plugin if not critical.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: CRITICAL. ⏱️ **Urgency**: Immediate action required. πŸ“’ **Reason**: Unauthenticated, high impact, and public PoC exist. Patch immediately to prevent data breach.