
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The Timetics WordPress plugin (AI-powered Appointment Booking with Visual Seat Plan and ultimate Calendar Scheduling) is affected by a vulnerability tracked as CVE-2024-1094. The vulnerability was discovered in all versions up to and including 1.0.21, and was disclosed on June 14, 2024. This security issue stems from a missing capability check in the make_staff() function (NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 7.3 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. The technical root cause is identified as a missing capability check in the make_staff() function, which fails to properly validate user permissions (Wordfence).
The vulnerability allows unauthenticated attackers to grant users staff permissions within the Timetics plugin. This unauthorized modification of user privileges could lead to elevation of privilege attacks and potential compromise of the WordPress site's security model (NVD).
Users should update their Timetics WordPress plugin to a version newer than 1.0.21 which contains the security fix (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”