{"api_version":"1","generated_at":"2026-04-23T22:46:08+00:00","cve":"CVE-2022-4340","urls":{"html":"https://cve.report/CVE-2022-4340","api":"https://cve.report/api/cve/CVE-2022-4340.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4340","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4340"},"summary":{"title":"CVE-2022-4340","description":"The BookingPress WordPress plugin before 1.0.31 suffers from an Insecure Direct Object Reference (IDOR) vulnerability in it's thank you page, allowing any visitor to display information about any booking, including full name, date, time and service booked, by manipulating the appointment_id query parameter.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-01-02 22:15:00","updated_at":"2023-11-07 03:57:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7","name":"https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7","refsource":"MISC","tags":[],"title":"BookingPress < 1.0.31 - Unauthenticated IDOR in appointment_id WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4340","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4340","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4340","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"reputeinfosystems","cpe5":"bookingpress","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4340","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The BookingPress WordPress plugin before 1.0.31 suffers from an Insecure Direct Object Reference (IDOR) vulnerability in it's thank you page, allowing any visitor to display information about any booking, including full name, date, time and service booked, by manipulating the appointment_id query parameter."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-639 Authorization Bypass Through User-Controlled Key"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"BookingPress","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7","refsource":"MISC","name":"https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Hussien Misbah"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-01-02 22:15:00","lastModifiedDate":"2023-11-07 03:57:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.0.31","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}