Authorization Bypass Through User-Controlled Key (CWE-639)
The WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin for WordPress is vulnerable to Account Takeover/Privilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 1.0.25. The vulnerability is due to missing validation on a user-controlled key in the save() function. This allows unauthenticated attackers to reset the emails and passwords of arbitrary user accounts, including administrators.
This vulnerability can lead to severe consequences: 1. Account Takeover: Attackers can reset emails and passwords of any user account, including administrators. 2. Privilege Escalation: By taking over an administrator account, attackers can gain full control of the WordPress site. 3. Data Breach: With administrative access, attackers can potentially access and exfiltrate sensitive information. 4. Website Compromise: Attackers could modify website content, install malicious plugins, or use the site for further attacks. 5. Reputational Damage: If exploited, it could lead to loss of trust from users and potential legal consequences.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is not explicitly mentioned in the provided information. However, given that the vulnerability affects "all versions up to, and including, 1.0.25" of the WP Timetics plugin, it is likely that a patched version (1.0.26 or later) may be available or in development. Users should check for updates and apply them as soon as they become available.
1. Update the WP Timetics plugin to a version newer than 1.0.25 if available. 2. If an update is not available, consider temporarily disabling the WP Timetics plugin until a patch is released. 3. Implement strong access controls and monitor for suspicious activities, especially those related to user account changes. 4. Use Web Application Firewalls (WAF) to help detect and block potential IDOR attacks. 5. Regularly audit user accounts and permissions, especially for administrative access. 6. Implement multi-factor authentication for all user accounts, especially administrative ones. 7. Keep WordPress core, themes, and all plugins up to date.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NVD published the first details for CVE-2024-9263
A CVSS base score of 9.8 has been assigned.
Feedly found the first article mentioning CVE-2024-9263. See article
Feedly estimated the CVSS score as HIGH
EPSS Score was set to: 0.05% (Percentile: 16.4%)
CVE-2024-9263 is a critical vulnerability in the WP Timetics plugin for WordPress, with a CVSS score of 9.8, allowing unauthenticated attackers to perform account takeover and privilege escalation due to insecure direct object reference in the save() function. Currently, there is no evidence of exploitation in the wild or public proof-of-concept exploits, and while a patch is not explicitly mentioned, users are advised to update to a version newer than 1.0.25 or disable the plugin until a fix is available. Mitigations include implementing strong access controls, using Web Application Firewalls, and enabling multi-factor authentication for user accounts. See article
Detection for the vulnerability has been added to Qualys (152322)