CVE-2026-32384
Local File Inclusion in WpBookingly β€1.2.9 Allows Code Execution
Publication date: 2026-03-13
Last updated on: 2026-03-17
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| magepeopleteam | wpbookingly | From 1.0.0 (inc) to 1.2.9 (inc) |
| magepeopleteam | wpbookingly | 1.3.0 |
| magepeopleteam | wpbookingly | to 1.2.9 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-98 | The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-32384 is a Local File Inclusion (LFI) vulnerability in the WordPress WpBookingly plugin versions up to and including 1.2.9.'}, {'type': 'paragraph', 'content': 'This vulnerability allows a malicious actor with at least Contributor or Developer privileges to include local files from the target website and display their contents.'}, {'type': 'paragraph', 'content': "Included files may contain sensitive information such as database credentials, which could potentially lead to a complete database takeover depending on the site's configuration."}, {'type': 'paragraph', 'content': 'The vulnerability is categorized under the OWASP Top 10 category A3: Injection and has a CVSS severity score of 7.5, indicating a moderate risk.'}, {'type': 'paragraph', 'content': 'It was reported by the researcher "daroo" on January 19, 2026, and publicly disclosed on February 18, 2026.'}, {'type': 'paragraph', 'content': 'The issue is fixed in version 1.3.0 of the WpBookingly plugin, and users are advised to update to this version or later.'}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'This vulnerability can allow an attacker with Contributor or Developer privileges to access and include local files from your website.'}, {'type': 'paragraph', 'content': 'Accessing these files may expose sensitive information such as database credentials.'}, {'type': 'paragraph', 'content': "If exploited, it could lead to a complete takeover of your database depending on your site's configuration."}, {'type': 'paragraph', 'content': "Such a compromise can result in data breaches, loss of data integrity, and unauthorized access to your website's backend."}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability allows a malicious actor with at least Contributor or Developer privileges to include local files from the target website and display their contents. Detection involves checking if the WpBookingly plugin version is vulnerable (version 1.2.9 or earlier) and monitoring for suspicious file inclusion attempts.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts, you can look for unusual HTTP requests targeting the WpBookingly plugin endpoints that include parameters referencing local files.'}, {'type': 'paragraph', 'content': 'Specific commands are not provided in the resources, but general approaches include:'}, {'type': 'list_item', 'content': 'Review web server access logs for requests containing suspicious parameters that may attempt local file inclusion.'}, {'type': 'list_item', 'content': "Use tools like grep to search logs for patterns such as 'include', 'require', or file path traversal sequences (e.g., '../')."}, {'type': 'list_item', 'content': 'Check the installed version of the WpBookingly plugin to confirm if it is version 1.2.9 or earlier.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update the WpBookingly plugin to version 1.3.0 or later, where the vulnerability is patched.
Additionally, ensure that only trusted users have Contributor or Developer privileges, as exploitation requires such access.
Using automated update tools like Patchstack can facilitate rapid protection by applying the necessary patches promptly.