This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Unauthenticated SQL Injection in WP Booking Calendar. π₯ **Consequences**: Attackers can manipulate database queries, leading to data theft, modification, or deletion.β¦
π΅οΈ **Privileges**: Unauthenticated access required. ποΈ **Data**: Full database read/write access. π **Impact**: High Confidentiality, Integrity, and Availability impact (CVSS H).
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: LOW. πͺ **Auth**: None required (Unauthenticated). βοΈ **Config**: Standard WordPress AJAX endpoint (`admin-ajax.php`). Easy to trigger via POST requests.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Exploit**: YES. π **PoC**: Publicly available on GitHub (sahar042/CVE-2024-1207). π **Wild Exploitation**: High risk due to simplicity and lack of auth requirement.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for `admin-ajax.php` with `action=WPBC_AJX_BOOKING__CREATE`. π‘ **Indicator**: Look for SQL errors or unexpected data in responses when injecting payloads into `dates_ddmmyy_csv`.
Q8Is it fixed officially? (Patch/Mitigation)
π οΈ **Fix**: Update to version > 9.9. π **Patch**: Developer released fix in changeset 3032596. β **Status**: Official mitigation available via plugin update.
Q9What if no patch? (Workaround)
π§ **Workaround**: If unpatched, restrict access to `admin-ajax.php` via WAF rules. π« **Block**: Filter malicious payloads in `dates_ddmmyy_csv` parameter. π **Disable**: Temporarily disable the plugin if not critical.
Q10Is it urgent? (Priority Suggestion)
π₯ **Priority**: CRITICAL. β±οΈ **Urgency**: Immediate action required. π’ **Reason**: Unauthenticated, high impact, and public PoC exist. Patch immediately to prevent data breach.