CVE-2026-6960
BookingPress · BookingPress Pro
The BookingPress Pro plugin for WordPress contains an arbitrary file upload vulnerability that can lead to unauthenticated remote code execution.
Executive summary
A critical arbitrary file upload vulnerability in the BookingPress Pro plugin for WordPress poses a severe risk of unauthenticated remote code execution.
Vulnerability
The vulnerability exists due to missing file type validation in the 'bookingpress_validate_submitted_booking_form_func' function. This allows an unauthenticated attacker to upload malicious files, specifically if a signature custom field is enabled on the booking form, leading to potential remote code execution.
Business impact
With a CVSS score of 9.8, this vulnerability is classified as critical. Successful exploitation provides attackers with the ability to execute arbitrary code on the underlying server, potentially leading to a complete system compromise, unauthorized access to sensitive booking data, and significant operational disruption.
Remediation
Immediate Action: Update to the latest version of BookingPress Pro immediately to apply the necessary file validation patches.
Proactive Monitoring: Review web server access logs for anomalous file upload attempts or requests to unexpected file types within the plugin's upload directory.
Compensating Controls: Implement a Web Application Firewall (WAF) to block suspicious file upload requests and restrict access to the booking form interface if feasible.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical severity and the ease of exploitation via the booking form, immediate patching is required. Administrators should verify their plugin version and apply updates without delay to prevent potential system-wide compromise.