Booking Ultra Pro Appointments Booking Calendar Plugin

Information

Software Type Plugin
Software Slug booking-ultra-pro (view on wordpress.org)
Software Status Active
Software Author deetronix
Software Website bookingultrapro.com
Software Downloads 178,220
Software Active Installs 1,000
Software Record Last Updated May 27, 2024

9 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
Booking Ultra Pro <= 1.1.12 - Authenticated (Contributor+) Privilege Escalation Patched CVE-2024-32960 8.8 Emili Castells April 23, 2024
Booking Ultra Pro <= 1.1.6 - Missing Authorization via save_fields_settings Patched CVE-2023-32601 4.3 Badromance 1337 May 12, 2023
Booking Ultra Pro <= 1.1.8 - Reflected Cross-Site Scripting Patched CVE-2023-32511 7.2 thiennv May 10, 2023
Booking Ultra Pro <= 1.1.8 - Unauthenticated Stored Cross-Site Scripting Patched CVE-2023-32236 7.2 TEAM WEBoB of BoB 11th May 10, 2023
Booking Ultra Pro <= 1.1.6 - Cross-Site Request Forgery Patched CVE-2022-46816 8.8 Nguyen Xuan Chien February 21, 2023
Booking Ultra Pro <= 1.1.5 - Missing Authorization Patched 8.8 September 29, 2022
Booking Ultra Pro <= 1.1.6 - Cross-Site Request Forgery Patched CVE-2021-36855 8.8 Ngo Van Thien September 29, 2022
Booking Ultra Pro <= 1.1.8 - Stored Cross-Site Scripting Patched CVE-2021-36854 6.4 Ngo Van Thien September 29, 2022
Booking Ultra Pro <= 1.1.6 - Cross-Site Request Forgery Patched CVE-2021-36854 8.8 Ngo Van Thien September 29, 2022

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation