Skip to content
CVSS 7.5 · HIGH

CVE-2026-6320

The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using those stored values as trusted paths for email attachments. This makes it possible for unauthenticated attackers to read arbitrary local files and exfiltrate them via booking confirmation email attachments.

Ver en NVD

Análisis

The Salon Booking System plugin for WordPress is vulnerable to an unauthenticated arbitrary file read, allowing attackers to steal sensitive server files like wp-config.php via email attachments. Since many developers in the community maintain WordPress sites for local businesses, this high-severity vulnerability in a popular booking tool warrants an alert.

Severidad

Puntaje: 7.5(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: NONE
A: NONE
Tipo de falla (CWE): CWE-22

EPSS

Probabilidad de explotación (próx. 30 días): 0.0010 (0.1%)
Percentil: 27.2%
EPSS: 2026-05-06

Descripción técnica

The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using those stored values as trusted paths for email attachments. This makes it possible for unauthenticated attackers to read arbitrary local files and exfiltrate them via booking confirmation email attachments.

Publicada: 2/5/2026, 12:16:16
Última modificación: 5/5/2026, 19:15:34

Referencias

InicioEventosBlogRecursosEquipo