CVE-2024-1634

Plain English Summary

AI-powered analysis for quick understanding

An attacker can disconnect the scheduling plugin from the startbooking service and erase important connection data without needing to log in. This vulnerability affects all versions up to 3.5.10 and requires no authentication, making it accessible to anyone on the internet.

Technical Description

The Scheduling Plugin – Online Booking for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'cbsb_disconnect_settings' function in all versions up to, and including, 3.5.10. This makes it possible for unauthenticated attackers to disconnect the plugin from the startbooking service and remove connection data.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactLow
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$931($500-$1K)
Vendor Response
Grade FPatched in 630 days

Quick Information

Published

Jun 18, 2024

almost 2 years ago

Last Modified

Mar 10, 2026

28 days ago

Vendor

startbooking

Product

scheduling plugin