// For flags

CVE-2022-0421

Five Star Restaurant Reservations < 2.4.12 - Unauthenticated Arbitrary Payment Status Update to Stored XSS

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Five Star Restaurant Reservations WordPress plugin before 2.4.12 does not have authorisation when changing whether a payment was successful or failed, allowing unauthenticated users to change the payment status of arbitrary bookings. Furthermore, due to the lack of sanitisation and escaping, attackers could perform Cross-Site Scripting attacks against a logged in admin viewing the failed payments

El complemento de WordPress Five Star Restaurant Reservations anterior a 2.4.12 no tiene autorización para cambiar si un pago fue exitoso o fallido, lo que permite a usuarios no autenticados cambiar el estado de pago de reservas arbitrarias. Además, debido a la falta de sanitización y escape, los atacantes podrían realizar ataques de Cross-Site Scripting contra un administrador que haya iniciado sesión y vea los pagos fallidos.

The Five Star Restaurant Reservations plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the rtb_stripe_pmt_succeed AJAX action in versions up to, and including, 2.4.11. This makes it possible for unauthenticated attackers to inject malicious JavaScript, that will execute whenever a user accesses the rtb-bookings page.

*Credits: Krzysztof Zając, WPScan
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-31 CVE Reserved
  • 2022-10-31 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-116: Improper Encoding or Escaping of Output
  • CWE-862: Missing Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fivestarplugins
Search vendor "Fivestarplugins"
Five Star Restaurant Reservations
Search vendor "Fivestarplugins" for product "Five Star Restaurant Reservations"
< 2.4.12
Search vendor "Fivestarplugins" for product "Five Star Restaurant Reservations" and version " < 2.4.12"
wordpress
Affected