Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-12558 PoC — WP BASE Booking of Appointments, Services and Events <= 4.9.2 - Missing Authorization to Authenticated (Subscriber+) Sen

Source
Associated Vulnerability
Title:WP BASE Booking of Appointments, Services and Events <= 4.9.2 - Missing Authorization to Authenticated (Subscriber+) Sensitive Information Exposure via app_export_db (CVE-2024-12558)
Description:The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive information from the database, such as the hashed administrator password.
Readme
# CVE-2024-12558-exploit

# Description
The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive information from the database, such as the hashed administrator password.

## Usage:

### Command-Line Arguments
| Argument           | Description                                                | Required |
|--------------------|------------------------------------------------------------|----------|
| `-u`, `--url`      | Base URL of the WordPress site (e.g., `http://example.com`) | ✅       |
| `-U`, `--username` | WordPress username.                                         | ✅       |
| `-p`, `--password` | WordPress password.                                         | ✅       |
| `-o`, `--output`   | File to save the database export (default: `output.sql`).   | ❌       |


Example Command
```
python CVE-2024-12558.py -u http://example.com -U username -p password -o output.sql

```
### Expected Output:
Here is an example of what the script might output:

```
Checking for the existence of the plugin at http://example.com/wp-content/plugins/wp-base-booking-of-appointments-services-and-events/...
Plugin found! Proceeding with further checks.
Checking version at http://example.com/wp-content/plugins/wp-base-booking-of-appointments-services-and-events/readme.txt...
Found version: 4.9.2
The site is vulnerable! Version 4.9.2 detected.
Attempting to log in...
Logged in successfully.
Sending POST request to export the database...
Database export request successful!
Database saved to output.sql

```
### Install the required packages

```
pip install requests
pip install colorama
```


### Note: 
This script is provided for educational purposes only. The author is not responsible for any damages caused by the misuse of this script.
File Snapshot

[4.0K] /data/pocs/634005fa049c0b102c4096660dfcb109ca3150f8 ├── [5.8K] CVE-2024-12558.py └── [2.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →