[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fuPxtaTEDHN5cBBCDWBHtDHEeHPylUV0oYVHWuv5RSxA":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-9263","wp-timetics-ai-powered-appointment-booking-calendar-and-online-scheduling-plugin-insecure-direct-object-reference-to-una","WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin \u003C= 1.0.25 - Insecure Direct Object Reference to Unauthenticated Arbitrary User Password\u002FEmail Reset\u002FAccount Takeover","The WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin plugin for WordPress is vulnerable to Account Takeover\u002FPrivilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 1.0.25 via the save() due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to reset the emails and passwords of arbitrary user accounts, including administrators, which makes account takeover and privilege escalation possible.","timetics",null,"\u003C=1.0.25","1.0.26","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Authorization Bypass Through User-Controlled Key","2024-10-16 00:00:00","2024-10-17 03:32:49",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F74bd595b-d2fa-4c62-82d2-dba2c2b128f0?source=api-prod",1]