The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Jun 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Iqonic
Iqonic wpbookit |
|
CPEs | cpe:2.3:a:iqonic:wpbookit:*:*:*:*:pro:wordpress:*:* | |
Vendors & Products |
Iqonicdesign
Iqonicdesign wpbookit |
Iqonic
Iqonic wpbookit |
Thu, 05 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Iqonicdesign
Iqonicdesign wpbookit |
|
CPEs | cpe:2.3:a:iqonicdesign:wpbookit:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Iqonicdesign
Iqonicdesign wpbookit |
Thu, 09 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 09 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. | |
Title | WPBookit <= 1.6.4 - Unauthenticated Arbitrary User Password Change | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-09T19:21:56.597Z
Updated: 2025-01-09T20:07:20.273Z
Reserved: 2024-10-21T15:57:05.564Z
Link: CVE-2024-10215

Updated: 2025-01-09T20:07:10.295Z

Status : Analyzed
Published: 2025-01-09T20:15:34.410
Modified: 2025-06-27T17:37:52.610
Link: CVE-2024-10215

No data.