VikBooking Hotel Booking Engine & PMS

Information

Software Type Plugin
Software Slug vikbooking (view on wordpress.org)
Software Status Active
Software Author e4jvikwp
Software Website vikwp.com
Software Downloads 128,616
Software Active Installs 8,000
Software Record Last Updated May 20, 2024

Showing 1-20 of 21 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
VikBooking Hotel Booking Engine & PMS <= 1.6.7 - Insecure Direct Object Reference to Menu Access Patched CVE-2024-2441 4.3 cyc707 April 19, 2024
VikBooking Hotel Booking Engine & PMS <= 1.6.7 - Missing Authorization Patched CVE-2024-2749 5.4 cyc707 April 19, 2024
VikBooking Hotel Booking Engine & PMS <= 1.6.7 - Reflected Cross-Site Scripting Patched CVE-2024-32563 6.1 Majed Refaea April 16, 2024
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in exec_multitask_widgets function Patched CVE-2023-25707 4.3 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.6.1 - Cross-Site Request Forgery in multiple functions in admin/controller.php Patched CVE-2023-32501 4.3 Nguyen Xuan Chien February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.6.1 - Cross-Site Request Forgery in listenTosFieldSavingTask function Patched CVE-2023-32501 4.3 Nguyen Xuan Chien February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in admin_widgets_welcome function Patched CVE-2023-25707 4.3 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in savetranslationstay function Patched CVE-2023-25707 5.4 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in exec_admin_widget function Patched CVE-2023-25707 4.3 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in savetranslation function Patched CVE-2023-25707 5.4 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in save_admin_widgets function Patched CVE-2023-25707 5.3 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in widgets_watch_data function Patched CVE-2023-25707 4.3 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in savetmplfile function Patched CVE-2023-25707 5.4 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in saveconfig function Patched CVE-2023-25707 5.4 Abdi Pranata February 15, 2023
VikBooking Hotel Booking Engine & PMS <= 1.5.11 - Authenticated (Admin+) Stored Cross-Site Scripting Patched CVE-2023-24396 4.4 yuyudhn January 27, 2023
VikBooking <= 1.5.8 - Reflected Cross-Site Scripting Patched CVE-2022-1528 6.1 Bruno Halltari May 3, 2022
VikBooking Hotel Booking Engine & PMS <= 1.5.7 - Admin+ Stored Cross-Site Scripting Patched CVE-2022-1408 5.5 Gabriel3476 April 21, 2022
VikBooking Hotel Booking Engine & PMS <= 1.5.8 - Arbitrary File Upload Patched CVE-2022-1409 5.5 Gabriel3476 April 21, 2022
VikBooking Hotel Booking Engine & PMS <= 1.5.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting Patched CVE-2022-1407 8.8 Gabriel3476 April 21, 2022
VikBooking Hotel Booking Engine & PMS <= 1.5.3 - Arbitrary File Upload Patched CVE-2022-27862 9.8 Huli, Cymetrics April 18, 2022

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation