Vulnerability Description
The Appointment Hour Booking plugin for WordPress is vulnerable to CAPTCHA bypass in versions up to, and including, 1.3.72. This is due to the use of insufficiently strong hashing algorithm on the CAPTCHA secret that is also displayed to the user via a cookie.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dwbooster | Appointment Hour Booking | <= 1.3.72 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatchThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f62d28bd-fa33-4f0b-a11
- https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4036Third Party Advisory
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatchThird Party Advisory
- https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4036Third Party Advisory
FAQ
What is CVE-2022-4036?
CVE-2022-4036 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The Appointment Hour Booking plugin for WordPress is vulnerable to CAPTCHA bypass in versions up to, and including, 1.3.72. This is due to the use of insufficiently strong hashing algorithm on the CAP...
How severe is CVE-2022-4036?
CVE-2022-4036 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4036?
Check the references section above for vendor advisories and patch information. Affected products include: Dwbooster Appointment Hour Booking.