CVE-2024-6175
Description
The Booking Ultra Pro Appointments Booking Calendar Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the multiple functions called via AJAX like save_fields_settings, bup_delete_user_avatar, bup_crop_avatar_user_profile_image, and more in all versions up to, and including, 1.1.13. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify and delete. multiple plugin options and data such as payments, pricing, booking information, business hours, calendars, profile information, and email templates.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Booking Ultra Pro plugin for WordPress lacks capability checks on multiple AJAX functions, allowing subscribers to modify payments, pricing, bookings, and other sensitive data.
The Booking Ultra Pro Appointments Booking Calendar Plugin for WordPress, up to version 1.1.13, is vulnerable to unauthorized modification of data due to missing capability checks on several AJAX functions. These functions include save_fields_settings, bup_delete_user_avatar, bup_crop_avatar_user_profile_image, and others. The root cause is that the plugin does not verify that the user making the AJAX request has the necessary administrative privileges before processing the action [1].
Attackers can exploit this vulnerability by authenticating with a Subscriber-level account or higher and sending crafted AJAX requests to any of the unprotected endpoints. No additional privileges or special network position is required, as the faulty functions are accessible directly through WordPress's admin-ajax interface. The attack surface is broad, covering multiple areas of the plugin's functionality [1].
The impact is significant: an authenticated attacker can modify and delete a wide range of plugin data and options. This includes payments, pricing information, booking records, business hours, calendar entries, user profile data, and email templates. Such unauthorized changes could disrupt business operations, lead to financial fraud, or cause loss of customer trust [1].
As of the publication date (2024-07-18), no patch has been released by the vendor. Users are advised to update the plugin as soon as a fixed version becomes available or to restrict access to the affected functions via other security measures, such as a Web Application Firewall (WAF) rule or capability mapping [1]. The vulnerability has not been reported as listed in the CISA Known Exploited Vulnerabilities (KEV) catalog at the time of writing.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.