Filtered by vendor Iqonicdesign Subscriptions
Filtered by product Wpbookit Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-32254 1 Iqonicdesign 1 Wpbookit 2025-06-09 5.3 Medium
Missing Authorization vulnerability in Iqonic Design WPBookit allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WPBookit: from n/a through 1.0.1.
CVE-2024-10215 1 Iqonicdesign 1 Wpbookit 2025-06-05 9.8 Critical
The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.
CVE-2025-0357 1 Iqonicdesign 1 Wpbookit 2025-05-28 9.8 Critical
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2025-26910 1 Iqonicdesign 1 Wpbookit 2025-05-21 7.1 High
Cross-Site Request Forgery (CSRF) vulnerability in Iqonic Design WPBookit allows Stored XSS. This issue affects WPBookit: from n/a through 1.0.1.
CVE-2025-3810 1 Iqonicdesign 1 Wpbookit 2025-05-21 9.8 Critical
The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like password and email through the edit_profile_data() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account.
CVE-2025-3811 1 Iqonicdesign 1 Wpbookit 2025-05-21 9.8 Critical
The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email through the edit_newdata_customer_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.